Select Page

Download Install J111FXXU0ARC1 March 2018 Security for Galaxy J1 Ace Neo

Download Install J111FXXU0ARC1 March 2018 Security for Galaxy J1 Ace Neo

You’re going to download the Samsung Galaxy J1 Ace Neo SM-J111F Firmware J111FXXU0ARC1 Android 5.1.1 Lollipop.

Samsung is rolling out the March, 2018 security update for the Galaxy J1 Ace Neo based on Android 5.1.1 Lollipop, and you can download this Stock Firmware Update for your Galaxy J1 Ace Neo here from the current page.

The March, 2018 Security Patch Update brings fixes for some issues such as critical vulnerabilities that detected in the Android OS as well as scores of moderate-risk and high-risk vulnerabilities. You can check the details of the J111FXXU0ARC1 March, 2018 Security Update Changelog at the bottom of this page.

Download the firmware update for the Samsung Galaxy J1 Ace Neo SM-J111F. Product Code for this firmware is TUR and it’s from Country/ Carrier Turkey. The PDA Version of this Firmware is J111FXXU0ARC1 and CSC is J111FOJW0ARC1. The Android Version is 5.1.1 Lollipop. The changelist for this firmware is 13312748, build date is 28.03.2018 and the Security patch level date is 01.03.2018.

WARNING: This Stock Firmware Update released only for Samsung Galaxy J1 Ace Neo SM-J111F, so do NOT try it in another Model number even if it has the same Device's name. Flashing wrong Firmware with Odin Tool or any other tools will brick you Android Phone, so you are the only one who responsible for that (We are NOT).

Model Name SAMSUNG Galaxy J1 Ace Neo
Model Number SM-J111F
Country/ Carrier Turkey
Region Code TUR
Android Version Android 5.1.1 Lollipop
Changelist 13312748
Build Date 28.03.2018
Security Patch Level


Samsung Galaxy J1 Ace Neo SM-J111F Stock Firmware Download

Download Page1 Download Page2

More Stock Firmware Updates for SM-J111F

Samsung Galaxy J1 Ace Neo Review Video

Feel Free to Share this Firmware Update with your Friends.

How to Flash the Firmware Update With Odin Flashing Tool?

Brief instructions about Firmware Flashing

– Extract (unzip) the firmware file that you have downloaded.
– Download Odin Flashing Tool.
– Extract Odin ZIP file.
– Open Odin Flashing Tool.
– Reboot your Phone in Download Mode (press and hold Home + Power + Volume Down buttons).
– Connect your phone to the PC and wait until you get a blue sign in Odin.
– Add the firmware file to AP / PDA.
– Make sure re-partition option is not ticked.
– Click the start button, and wait few minutes.

Follow this tutorial for detailed and Step-by-step instructions.

Samsung March, 2018 Security Patch Update Details (SMR-MAR-2018)

Along with Google patches, Samsung Mobile provides 5 Samsung Vulnerabilities and Exposures (SVE) items described below, in order to improve our customer’s confidence on security of Samsung Mobile devices. Samsung security index (SSI), found in “Security software version”, SMR Mar-2018 Release 1 includes all patches from Samsung and Google. Some of the SVE items may not be included in this package, in case these items were already included in a previous maintenance release.

SVE-2017-10993: Kernel pointer leak in USB gadget driver

Severity: Moderate
Affected Versions: L(5.x), M(6.0), N(7.x), O(8.0)
Reported on: September 15, 2017
Disclosure status: Privately disclosed.
A vulnerability in USB gadget driver allows kernel pointer leakeage.
The applied patch modified incorrect implementation of kernel logging.

SVE-2017-10897: NFC activated by magnet

Severity: Low
Affected Versions: N(7.x)
Reported on: September 14, 2017
Disclosure status: Privately disclosed.
A vulnerability allows NFC activation to bypass lockscreen when a magnet is brought close to a specific point of device.
The patch disables NFC activation in such event.

SVE-2017-10748: Accessing the Clipboard content using Edge panel

Severity: High
Affected Versions: N(7.x) (Edge)
Reported on: October 27, 2017
Disclosure status: Privately disclosed.
The clipboard edge allows attackers to access device information without user authentication for a short period after locking screen once.
The patch protects contents of clipboard using a screen lock type when turning the Clipboard Edge on.

SVE-2017-11018: Dual Messenger use permission without user agreement

Severity: Moderate
Affected Versions: N(7.x) (Dual Messenger)
Reported on: November 19, 2017
Disclosure status: Privately disclosed.
A vulnerability in DualMessenger feature allows the second app of messenger app to use the runtime permission of the first messenger app without user’s consent.
The patch fixes this vulnerability.

Some SVE items included in the Samsung Android Security Update cannot be disclosed at this time.

See Full details about March, 2018 Security Patch Update here.

Leave a reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.