{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T10:16:48.904","vulnerabilities":[{"cve":{"id":"CVE-2017-0564","sourceIdentifier":"security@android.com","published":"2017-04-07T22:59:01.073","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An elevation of privilege vulnerability in the kernel ION subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34276203."},{"lang":"es","value":"Vulnerabilidad de elevación de privilegios en el subsistema ION del kernel podría permitir que una aplicación maliciosa local ejecute código arbitrario dentro del contexto del kernel. Este problema está clasificado como crítico debido a la posibilidad de un compromiso de dispositivo permanente local, que puede requerir reflashing del sistema operativo para reparar el dispositivo. Producto: Android. Versiones: Kernel-3.10, Kernel-3.18. ID de Android: A-34276203."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*","matchCriteriaId":"1C37F47C-C217-4BCF-A758-14E1BDBAD63D"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*","matchCriteriaId":"364CAD86-F652-4B84-932A-A8D9146C9010"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/97344","source":"security@android.com"},{"url":"http://www.securitytracker.com/id/1038201","source":"security@android.com"},{"url":"https://source.android.com/security/bulletin/2017-04-01","source":"security@android.com","tags":["Patch","Vendor Advisory"]},{"url":"https://source.android.com/security/bulletin/2017-12-01","source":"security@android.com"},{"url":"http://www.securityfocus.com/bid/97344","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securitytracker.com/id/1038201","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://source.android.com/security/bulletin/2017-04-01","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://source.android.com/security/bulletin/2017-12-01","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}