CVE-2021-1048
ENISA EUVD: EUVD-2021-6515 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: March 5, 2026
3 articles
Published: 2021-12-15
EPSS Score
Source: FIRST.org · 2026-05-23
0.91%
probability
This CVE has a 0.91% probability
of being exploited in the next 30 days.
0%
Top 76.1th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v2 (legacy)
7.2
HIGH
Access Vector
Local
Access Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
AV:L/AC:L/Au:N/C:C/I:C/A:C
Description
VulnerabilityLookup (CNA)In ep_loop_check_proc of eventpoll.c, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-204573007References: Upstream kernel
Affected Products
n/a
Android
Android kernel
Attack Intelligence
CWE-118
· Incorrect Access of Indexable Resource ('Range Error')
CWE-119
· Buffer Overflow
CWE-416
· Use After Free
CWE-664
· Improper Control of a Resource Through its Lifetime
CWE-666
· Operation on Resource in Wrong Phase of Lifetime
CWE-672
· Operation on a Resource after Expiration or Release
CWE-825
· Expired Pointer Dereference
Google Project Zero
Patched
Nov. 6, 2021
Reported by
Clément Lecigne and Christian Resell from Google's Threat Analysis Group
Root Cause Analysis
https://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2021/CVE-2021-1048.html
https://source.android.com/security/bulletin/2021-11-01
x_refsource_MISC
Signal Intelligence
Confidence
95%
EPSS
0.91%
CVSS v3.1
7.8
Mentions
3
Last Seen
May 22, 2022
CNA Information
CNA Assigner
google_android
Analyst Note
Auto-imported from Google Project Zero — confirmed zero-day by definition.
Threat Actors 1
PassCV
apt_group
Information theft and espionage
🇨🇳 CN
Triage Info
Decided atMar 05, 2026
Published DateDec 15, 2021