{"api_version":"1","generated_at":"2026-04-23T00:59:50+00:00","cve":"CVE-2021-0703","urls":{"html":"https://cve.report/CVE-2021-0703","api":"https://cve.report/api/cve/CVE-2021-0703.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-0703","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-0703"},"summary":{"title":"CVE-2021-0703","description":"In SecondStageMain of init.cpp, there is a possible use after free due to incorrect shared_ptr usage. This could lead to local escalation of privilege if the attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-184569329","state":"PUBLIC","assigner":"security@android.com","published_at":"2021-10-22 14:15:00","updated_at":"2021-10-26 22:57:00"},"problem_types":["CWE-416"],"metrics":[],"references":[{"url":"https://source.android.com/security/bulletin/2021-10-01","name":"https://source.android.com/security/bulletin/2021-10-01","refsource":"MISC","tags":[],"title":"Android Security Bulletin—October 2021  |  Android Open Source Project","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-0703","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-0703","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"703","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"google","cpe5":"android","cpe6":"11.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-0703","qid":"610373","title":"Google Android Devices October 2021 Security Patch Missing"},{"cve":"CVE-2021-0703","qid":"610375","title":"Google Android October 2021 Security Patch Missing for Samsung"},{"cve":"CVE-2021-0703","qid":"610376","title":"Google Android October 2021 Security Patch Missing for LGE"},{"cve":"CVE-2021-0703","qid":"610381","title":"Google Android November 2021 Security Patch Missing for Huawei EMUI"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2021-0703","ASSIGNER":"security@android.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Android","version":{"version_data":[{"version_value":"Android-11"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Elevation of privilege"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://source.android.com/security/bulletin/2021-10-01","url":"https://source.android.com/security/bulletin/2021-10-01"}]},"description":{"description_data":[{"lang":"eng","value":"In SecondStageMain of init.cpp, there is a possible use after free due to incorrect shared_ptr usage. This could lead to local escalation of privilege if the attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-184569329"}]}},"nvd":{"publishedDate":"2021-10-22 14:15:00","lastModifiedDate":"2021-10-26 22:57:00","problem_types":["CWE-416"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":6.8,"baseSeverity":"MEDIUM"},"exploitabilityScore":0.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":7.2},"severity":"HIGH","exploitabilityScore":3.9,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"703","Ordinal":"190405","Title":"CVE-2021-0703","CVE":"CVE-2021-0703","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"703","Ordinal":"1","NoteData":"In SecondStageMain of init.cpp, there is a possible use after free due to incorrect shared_ptr usage. This could lead to local escalation of privilege if the attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-184569329","Type":"Description","Title":null},{"CveYear":"2021","CveId":"703","Ordinal":"2","NoteData":"2021-10-22","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"703","Ordinal":"3","NoteData":"2021-10-22","Type":"Other","Title":"Modified"}]}}}