Select Page

Download T715YDXU2CRB1 January 2018 Security Patch for Galaxy Tab S2

Now the T715YDXU2CRB1 January, 2018 Security Patch update for Samsung Galaxy Tab S2 SM-T715Y is available here on Yes Android Website for manual download and installation if you didn't receive it through OTA.

The new Stock Firmware update is rolling out via OTA (Over the air) for few users in a phase-wise manner, so it may take a while to reach every user around the globe. If you have not received the update, you can wait for the OTA notification to to download and install the update or you can manually check the latest software update which upgrades the build number to T715YDXU2CRB1 on Galaxy Tab S2.

In case you didn't get the T715YDXU2CRB1 Stock Firmware Update for Galaxy Tab S2 SM-T715Y via OTA, you can download and install it manually using Odin Flashing Tool.

Probably you know How to Flash the Stock Firmware Update with Odin, but if you can't do that, you will need my step-by-step tutorial about How to Flash Samsung Galaxy Firmware Updates with Odin Tool.

Samsung is rolling out the January, 2018 Security Patch update for the Galaxy Tab S2 SM-T715Y which will update the Galaxy Tab S2 Software to the new PDA version T715YDXU2CRB1 which based on Android Nougat 7.0.

Another thing to keep in mind, on this page you will be able to download the latest firmware update T715YDXU2CRB1 Android 7.0 Nougat for Samsung Galaxy Tab S2 SM-T715Y. So please make sure that your phone's model number is SM-T715Y.

T715YDXU2CRB1 January, 2018 Security Update quick overview

Region Code for this firmware is XSP and it’s from Country/ Carrier Singapore. The PDA Version of this Firmware is T715YDXU2CRB1 and CSC is T715YOLB2CRB1. The Android Version is 7.0 Nougat. The changelist for this firmware is 12974407, build date is 06.02.2018 and the Security patch level date is 01.01.2018.

Note: We did our best to make the installation guide easy and understandable, but in any situation we are NOT responsible for any brick or damages that may cause on your phone. Flashing ROM and installation process at your own risk.

How to install T715YDXU2CRB1 January, 2018 Security Update via Official Methods?

Install the update via Samsung SmartSwitch/Kies:

  • Run Kies/ SmartSwitch on your PC.
  • Connect your Samsung Galaxy Phone to the USB port in your PC via USB data transfer cable.
  • Wait for your device to appear on Kies/SmartSwitch.
  • Click on the device name (e.g SM-T715Y).
  • Under the "Firmware Information" tab, if there any updates available, you will get the message "New Firmware is available". Click on the "Firmware Upgrade" button.

Install the update via OTA (Over The Air):

  • Connected your phone to a stable WiFi Internet Connection.
  • Go to "Settings> More> About Phone> Software Updates" and click on "Check for updates".
  • If there any updates you available, you will get the message "New Firmware Update Available". Click "Download".
  • After downloading, click "Install" to start the firmware update installation process.

Below, you will find the full details about Galaxy Tab S2 Firmware update that released for model SM-T715Y.

SM-T715Y Stock Firmware T715YDXU2CRB1 Full Details

Model NameSAMSUNG Galaxy Tab S2
Model NumberSM-T715Y
Country/ CarrierSingapore
Region CodeXSP
Android VersionAndroid 7.0 Nougat
Build Date06.02.2018
Security Patch Level


Galaxy Tab S2 SM-T715Y Stock Firmware Download

Download Page1Download Page2

Note: Please note that you can't download the files over 2GB in the Free membership, you will have to upgrade to the premium membership. We are sorry for that but till this moment we can't find any other free solution better than this.

More Firmware Updates for Samsung SM-T715Y:

Samsung Galaxy Tab S2 Review

I hope this guide was helpful to download and install T715YDXU2CRB1 January, 2018 Security Patch on Galaxy Tab S2 SM-T715Y based on Android 7.0 Nougat.


Brief instructions to Flash Firmware Update with Odin

– Extract (unzip) the firmware file that you have downloaded.
– Download Odin Flashing Tool.
– Extract Odin ZIP file.
– Open Odin Flashing Tool.
– Reboot your Phone in Download Mode (press and hold Home + Power + Volume Down buttons).
– Connect your phone to the PC and wait until you get a blue sign in Odin.
– Add the firmware file to AP / PDA.
– Make sure re-partition option is not ticked.
– Click the start button, and wait few minutes.

Follow this tutorial for detailed and Step-by-step instructions.

Samsung January, 2018 Security Patch Update Details (SMR-JAN-2018)

Along with Google patches, Samsung Mobile provides 13 Samsung Vulnerabilities and Exposures (SVE) items described below, in order to improve our customer’s confidence on security of Samsung Mobile devices. Samsung security index (SSI), found in “Security software version”, SMR Jan-2018 Release 1 includes all patches from Samsung and Google. Some of the SVE items may not be included in this package, in case these items were already included in a previous maintenance release.

Note: In response to the disclosure of Meltdown and Spectre vulnerabilities (CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754), Samsung is adding patch for CVE-2017-13218, which is provided by Google and effectively mitigates all three related CVE’s. Samsung security index (SSI) of SMR Jan-2018 Release MS includes patch for CVE-2017-13218, in addition to all patches in SMR Jan-2018 Release 1.

SVE-2017-10599:vnswap Heap overflow via store function

Severity: Low
Affected versions: L(5.x), M(6.x), N(7.x)
Reported on: September 10, 2017
Disclosure status: Privately disclosed.
Lack of boundary checking in vnswap can lead to arbitrary write with privilege escalation.
The patch prevents from writing arbitrary data over the limit of buffer.

SVE-2017-9995:Vulnerability in S8’s InputMethodManagerService

Severity: Low
Affected versions: N(7.x)
Reported on: August 16, 2017
Disclosure status: Privately disclosed.
Device can be rebooted by calling unprotected system service.
The patch prevents a device from rebooting by checking caller’s package name,service name and uid.

SVE-2017-10732:Arbitrary code execution in bootloader via Integer overflow

Severity: Critical
Affected versions: N(7.x) on MT6755/MT6757 models (Mediatek)
Reported on: October 18, 2017
Disclosure status: Privately disclosed.
It is possible to make arbitrary code execution in Bootloader by integer overflow in download offset control.
The patch prevents integer overflow by checking the size value.

SVE-2017-10745:Buffer overflow in exynos chipset

Severity: Critical
Affected versions: All on S.LSI modem chipset
Reported on: November 3, 2017
Disclosure status: Privately disclosed.
There is a buffer overflow issue in the Exynos modem chipset and resulting in a possible baseband exploit.
The patch prevents the baseband exploit by checking the length and IEvalidation on session management module.

SVE-2017-10638:Information disclosure on Trustlet

Severity: Low
Affected versions: M(6.x), N(7.x) on Qualcomm chipsets
Reported on: September 29, 2017
Disclosure status: Privately disclosed.
A session information of trustlet is logged in user binary.
The patch prevents from printing a log which includes session information of the trustlet.

SVE-2017-10733:Stack overflow in Trustlet

Severity: Critical
Affected versions: N(7.x) on Exynos Chipsets
Reported on: September 15, 2017
Disclosure status: Privately disclosed.
A vulnerability allows an attacker to obtain pin/password/pattern lock screen data with system privileges via brute force attack.
The patch prevents arbitrary code execution in TEE using stack overflow attack.

SVE-2017-10906:System Crash via abnormal exception handling

Severity: Low
Affected versions: M(6.x), N(7.x)
Reported on: November 2, 2017
Disclosure status: Privately disclosed.
There is no proper exception handling in Telecom’s activity and it can make system crash via arbitrary calling component.
The patch applies proper exception handling to prevent system crash.

SVE-2017-10885:Sending Malicious ATCMD via DeviceTest application

Severity: Critical
Affected versions: M(6.x), N(7.x)
Reported on: November 18, 2017
Disclosure status: Privately disclosed.
Malicious AT Command can be executed with DeviceTest via NFC Tag from malicious application.
The patch prevents from executing malicious AT command in officially released binary with restriction to handle the command only in Factory binary.

Some SVE items included in the Samsung Android Security Update cannot be disclosed at this time.

See Full details about April, 2018 Security Patch Update here.


About The Author

Ahmed Sheta

Ahmed Sheta graduated from Computer and Information Institute with MIS Bachelor's degree. He is currently working as a Freelancer SEO Copywriter and YouTuber. He also helps many small and medium Arabic & English websites as a mentor, especially in SEO Copywriting, and Technical SEO. He also trains Creators to be successful on YouTube, and trains webmasters on SEO Copywriting. Ahmed shares his knowledge about IT on his personal Blog and YouTube channel. YouTube has chosen him to be the second Top Contributor & Product Expert in the Arab world. He also a YouTube Certified with 3 Certificates.

Leave a reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.