{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T12:36:42.341","vulnerabilities":[{"cve":{"id":"CVE-2017-0448","sourceIdentifier":"security@android.com","published":"2017-02-08T15:59:01.957","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An information disclosure vulnerability in the NVIDIA video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as High because it could be used to access sensitive data without explicit user permission. Product: Android. Versions: Kernel-3.10. Android ID: A-32721029. References: N-CVE-2017-0448."},{"lang":"es","value":"Una vulnerabilidad de divulgación de información en el controlador de vídeo NVIDIA podría habilitar a una aplicación local maliciosa acceder a datos fuera de sus niveles de permiso. Este problema está clasificado como High porque podría ser utilizado para acceso a datos sensibles sin permisos de usuario explícitos. Producto: Android. Versiones: Kernel-3.10. Android ID: A-32721029. Referencias: N-CVE-2017-0448."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*","versionEndIncluding":"7.1.1","matchCriteriaId":"0F11609D-D1B4-4DD6-8CC7-A224344E1E67"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*","matchCriteriaId":"1C37F47C-C217-4BCF-A758-14E1BDBAD63D"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/96105","source":"security@android.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1037798","source":"security@android.com"},{"url":"https://source.android.com/security/bulletin/2017-02-01.html","source":"security@android.com","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/96105","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1037798","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://source.android.com/security/bulletin/2017-02-01.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}