{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T08:19:22.237","vulnerabilities":[{"cve":{"id":"CVE-2021-0655","sourceIdentifier":"security@android.com","published":"2021-11-18T15:15:08.453","lastModified":"2024-11-21T05:43:05.430","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In mdlactl driver, there is a possible memory corruption due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05673424; Issue ID: ALPS05673424."},{"lang":"es","value":"En mdlactl driver, se presenta una posible corrupción de memoria debido a una comprobación de límites incorrecta. Esto podría conllevar a una escalada de privilegios local con privilegios de ejecución System requeridos. No es requerida una interacción del usuario para su explotación. ID de parche: ALPS05673424; ID del Problema: ALPS05673424."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*","matchCriteriaId":"D558D965-FA70-4822-A770-419E73BA9ED3"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*","matchCriteriaId":"109DD7FD-3A48-4C3D-8E1A-4433B98E1E64"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*","matchCriteriaId":"F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*","matchCriteriaId":"80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*","matchCriteriaId":"15E2EC3F-9FB3-488B-B1C1-2793A416C755"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*","matchCriteriaId":"DD64413C-C774-4C4F-9551-89E1AA9469EE"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*","matchCriteriaId":"3B787DC3-8E5A-4968-B20B-37B6257FAAE2"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*","matchCriteriaId":"D8E91CA4-CA5B-40D1-9A96-2B875104BCF4"},{"vulnerable":false,"criteria":"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*","matchCriteriaId":"213B5C7F-D965-4312-9CDF-4F06FA77D401"}]}]}],"references":[{"url":"https://corp.mediatek.com/product-security-bulletin/November-2021","source":"security@android.com","tags":["Vendor Advisory"]},{"url":"https://corp.mediatek.com/product-security-bulletin/November-2021","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}