Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

CVE-2021-0424

CVE information

Published

2 years ago

Last Modified

1 year ago

CVSSv2.0 Severity

Low

CVSSv3.1 Severity

Medium

Impact Analysis

Description

In memory management driver, there is a possible system crash due to a missing bounds check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05393787..

CVSSv2.0 Score

Severity
Low
Base Score
2.1/10
Exploit Score
3.9/10
Access Vector
Local
Access Complexity
Low
Authentication Required
None
Impact Score
2.9/10
Confidentiality Impact
None
Availability Impact
Partial
Integrity Impact
None

CVSSv3.1 Score

Severity
Medium
Base Score
5.5/10
Exploit Score
1.8/10
Access Vector
Local
Access Complexity
Low
Privileges Required
Low
Impact Score
3.6/10
Confidentiality Impact
None
Availability Impact
High
Integrity Impact
None
Scope
Unchanged
User Interaction
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
  No
-