Vulnerability Details CVE-2021-40148
In Modem EMM, there is a possible information disclosure due to a missing data encryption. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00716585; Issue ID: ALPS05886933.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 64.5%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2021-40148
-
cpe:2.3:h:mediatek:mt2731:-
-
cpe:2.3:h:mediatek:mt2735:-
-
cpe:2.3:h:mediatek:mt3967:-
-
cpe:2.3:h:mediatek:mt6297:-
-
cpe:2.3:h:mediatek:mt6739:-
-
cpe:2.3:h:mediatek:mt6761:-
-
cpe:2.3:h:mediatek:mt6762:-
-
cpe:2.3:h:mediatek:mt6762d:-
-
cpe:2.3:h:mediatek:mt6762m:-
-
cpe:2.3:h:mediatek:mt6763:-
-
cpe:2.3:h:mediatek:mt6765:-
-
cpe:2.3:h:mediatek:mt6765t:-
-
cpe:2.3:h:mediatek:mt6767:-
-
cpe:2.3:h:mediatek:mt6768:-
-
cpe:2.3:h:mediatek:mt6769:-
-
cpe:2.3:h:mediatek:mt6769t:-
-
cpe:2.3:h:mediatek:mt6769z:-
-
cpe:2.3:h:mediatek:mt6771:-
-
cpe:2.3:h:mediatek:mt6779:-
-
cpe:2.3:h:mediatek:mt6781:-
-
cpe:2.3:h:mediatek:mt6783:-
-
cpe:2.3:h:mediatek:mt6785:-
-
cpe:2.3:h:mediatek:mt6785t:-
-
cpe:2.3:h:mediatek:mt6833:-
-
cpe:2.3:h:mediatek:mt6853:-
-
cpe:2.3:h:mediatek:mt6855:-
-
cpe:2.3:h:mediatek:mt6873:-
-
cpe:2.3:h:mediatek:mt6875:-
-
cpe:2.3:h:mediatek:mt6875t:-
-
cpe:2.3:h:mediatek:mt6877:-
-
cpe:2.3:h:mediatek:mt6880:-
-
cpe:2.3:h:mediatek:mt6883:-
-
cpe:2.3:h:mediatek:mt6885:-
-
cpe:2.3:h:mediatek:mt6889:-
-
cpe:2.3:h:mediatek:mt6890:-
-
cpe:2.3:h:mediatek:mt6891:-
-
cpe:2.3:h:mediatek:mt6893:-
-
cpe:2.3:h:mediatek:mt8666:-
-
cpe:2.3:h:mediatek:mt8675:-
-
cpe:2.3:h:mediatek:mt8765:-
-
cpe:2.3:h:mediatek:mt8766:-
-
cpe:2.3:h:mediatek:mt8768:-
-
cpe:2.3:h:mediatek:mt8771:-
-
cpe:2.3:h:mediatek:mt8786:-
-
cpe:2.3:h:mediatek:mt8788:-
-
cpe:2.3:h:mediatek:mt8791:-
-
cpe:2.3:h:mediatek:mt8797:-
-
-
cpe:2.3:o:mediatek:lr11:-
-
cpe:2.3:o:mediatek:lr12:-
-
cpe:2.3:o:mediatek:lr12a:-
-
cpe:2.3:o:mediatek:lr13:-
-
cpe:2.3:o:mediatek:nr15:-