Qualcomm Qualcomm

Do you want an email whenever new security vulnerabilities are reported in any Qualcomm product?

Products by Qualcomm Sorted by Most Security Vulnerabilities since 2018

Qualcomm Eudora3 vulnerabilities

Qualcomm Sd7101 vulnerability

Qualcomm Qfe33351 vulnerability

Qualcomm Qfe33401 vulnerability

Qualcomm Qfe33451 vulnerability

Qualcomm Qfs25301 vulnerability

Qualcomm Qfs25801 vulnerability

Qualcomm Qfs26081 vulnerability

Qualcomm Qfs26301 vulnerability

Qualcomm Qln46421 vulnerability

Qualcomm Qln46501 vulnerability

Qualcomm Qln50201 vulnerability

Qualcomm Qln50301 vulnerability

Qualcomm Qln50401 vulnerability

Qualcomm Qpa26251 vulnerability

Qualcomm Qpa54611 vulnerability

Qualcomm Qpa55801 vulnerability

Qualcomm Qpa55811 vulnerability

Qualcomm Qpa88011 vulnerability

Qualcomm Qpa88021 vulnerability

Qualcomm Qpa88031 vulnerability

Qualcomm Qpa88211 vulnerability

Qualcomm Qpa88421 vulnerability

Qualcomm Qpm46211 vulnerability

Qualcomm Qpm46301 vulnerability

Qualcomm Qpm46401 vulnerability

Qualcomm Qpm46411 vulnerability

Qualcomm Qpm46501 vulnerability

Qualcomm Qpm56211 vulnerability

Qualcomm Qpm56411 vulnerability

Qualcomm Qpm56701 vulnerability

Qualcomm Qpm56771 vulnerability

Qualcomm Qpm56791 vulnerability

Qualcomm Qpm58701 vulnerability

Qualcomm Qpm58751 vulnerability

Qualcomm Qpm65851 vulnerability

Qualcomm Qpm66211 vulnerability

Qualcomm Qpm66701 vulnerability

Qualcomm Qpm88201 vulnerability

Qualcomm Qpm88701 vulnerability

Qualcomm Qpopper1 vulnerability

Qualcomm Qtc800h1 vulnerability

Qualcomm Qtc800s1 vulnerability

Qualcomm Qtc801s1 vulnerability

Qualcomm Qtm5251 vulnerability

Qualcomm Sa6145p1 vulnerability

Qualcomm Sa6150p1 vulnerability

Qualcomm Sa6155p1 vulnerability

Qualcomm Sa8150p1 vulnerability

Qualcomm Sa8155p1 vulnerability

Qualcomm Sa8195p1 vulnerability

Qualcomm Sd2101 vulnerability

Qualcomm Sd4801 vulnerability

Qualcomm Sd6701 vulnerability

Qualcomm Wcn36201 vulnerability

Qualcomm Wtr49051 vulnerability

Qualcomm Wtr46051 vulnerability

Qualcomm Wtr39251 vulnerability

Qualcomm Wtr29551 vulnerability

Qualcomm Wtr26051 vulnerability

Qualcomm Wtr1625l1 vulnerability

Qualcomm Wtr16251 vulnerability

Qualcomm Wtr1605l1 vulnerability

Qualcomm Wtr16051 vulnerability

Qualcomm Wsa88351 vulnerability

Qualcomm Wsa88301 vulnerability

Qualcomm Wgr76401 vulnerability

Qualcomm Wfr16201 vulnerability

Qualcomm Wcn68561 vulnerability

Qualcomm Wcn68551 vulnerability

Qualcomm Wcn68511 vulnerability

Qualcomm Wcn68501 vulnerability

Qualcomm Wcn39911 vulnerability

Qualcomm Wcn39901 vulnerability

Qualcomm Wcn39881 vulnerability

Qualcomm Wcn39801 vulnerability

Qualcomm Wcn3680b1 vulnerability

Qualcomm Wcn36801 vulnerability

Qualcomm Wcn3660b1 vulnerability

Qualcomm Wcn3660a1 vulnerability

Qualcomm Wcn36601 vulnerability

Qualcomm Smb13981 vulnerability

Qualcomm Sd8881 vulnerability

Qualcomm Sd888 5g1 vulnerability

Qualcomm Sdr6601 vulnerability

Qualcomm Sdr660g1 vulnerability

Qualcomm Sdr7351 vulnerability

Qualcomm Sdr735g1 vulnerability

Qualcomm Sdr8651 vulnerability

Qualcomm Sdxr11 vulnerability

Qualcomm Smb13511 vulnerability

Qualcomm Smb13551 vulnerability

Qualcomm Smb13601 vulnerability

Qualcomm Smb13961 vulnerability

Qualcomm Wcd93801 vulnerability

Qualcomm Wcd93411 vulnerability

Qualcomm Wcd93701 vulnerability

Qualcomm Wcd93751 vulnerability

Qualcomm Wcd93301 vulnerability

Known Exploited Qualcomm Vulnerabilities

The following Qualcomm vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.

Title Description Added
Qualcomm Multiple Chipsets Integer Overflow Vulnerability Multiple Qualcomm chipsets contain an integer overflow vulnerability due to memory corruption in Graphics Linux while assigning shared virtual memory region during IOCTL call. CVE-2023-33107 December 5, 2023
Qualcomm Multiple Chipsets Use of Out-of-Range Pointer Offset Vulnerability Multiple Qualcomm chipsets contain a use of out-of-range pointer offset vulnerability due to memory corruption in Graphics while submitting a large list of sync points in an AUX command to the IOCTL_KGSL_GPU_AUX_COMMAND. CVE-2023-33106 December 5, 2023
Qualcomm Multiple Chipsets Use-After-Free Vulnerability Multiple Qualcomm chipsets contain a use-after-free vulnerability due to memory corruption in DSP Services during a remote call from HLOS to DSP. CVE-2023-33063 December 5, 2023
Qualcomm Multiple Chipsets Use-After-Free Vulnerability Multiple Qualcomm chipsets contain a use-after-free vulnerability when process shell memory is freed using IOCTL munmap call and process initialization is in progress. CVE-2022-22071 December 5, 2023
Qualcomm Multiple Chipsets Improper Input Validation Vulnerability Memory corruption due to improper check to return error when user application requests memory allocation of a huge size in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables CVE-2020-11261 December 1, 2021
Qualcomm Improper Error Handling Vulnerability Improper handling of address deregistration on failure can lead to new GPU address allocation failure. CVE-2021-1906 November 3, 2021
Qualcomm Use-After-Free Vulnerability Possible use after free due to improper handling of memory mapping of multiple processes simultaneously CVE-2021-1905 November 3, 2021

By the Year

In 2024 there have been 0 vulnerabilities in Qualcomm . Qualcomm did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 2 6.50
2020 2 7.10
2019 1 9.80
2018 0 0.00

It may take a day or so for new Qualcomm vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Qualcomm Security Vulnerabilities

Potential UE reset while decoding a crafted Sib1 or SIB1

CVE-2020-11268 7.5 - High - May 07, 2021

Potential UE reset while decoding a crafted Sib1 or SIB1 that schedules unsupported SIBs and can lead to denial of service in Snapdragon Auto, Snapdragon Mobile

Improper Input Validation

Memory corruption during buffer allocation due to dereferencing session ctx pointer without checking if pointer is valid in Snapdragon Auto

CVE-2020-11254 5.5 - Medium - May 07, 2021

Memory corruption during buffer allocation due to dereferencing session ctx pointer without checking if pointer is valid in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Mobile

NULL Pointer Dereference

The QCMAP_Web_CLIENT binary in the Qualcomm QCMAP software suite prior to versions released in October 2020 does not validate the return value of a strstr() or strchr() call in the Tokenizer() function

CVE-2020-25858 7.5 - High - October 15, 2020

The QCMAP_Web_CLIENT binary in the Qualcomm QCMAP software suite prior to versions released in October 2020 does not validate the return value of a strstr() or strchr() call in the Tokenizer() function. An attacker who invokes the web interface with a crafted URL can crash the process, causing denial of service. This version of QCMAP is used in many kinds of networking devices, primarily mobile hotspots and LTE routers.

NULL Pointer Dereference

The QCMAP_CLI utility in the Qualcomm QCMAP software suite prior to versions released in October 2020 uses a system() call without validating the input

CVE-2020-25859 6.7 - Medium - October 15, 2020

The QCMAP_CLI utility in the Qualcomm QCMAP software suite prior to versions released in October 2020 uses a system() call without validating the input, while handling a SetGatewayUrl() request. A local attacker with shell access can pass shell metacharacters and run arbitrary commands. If QCMAP_CLI can be run via sudo or setuid, this also allows elevating privileges to root. This version of QCMAP is used in many kinds of networking devices, primarily mobile hotspots and LTE routers.

Shell injection

Integer overflow to buffer overflow vulnerability in PostScript image handling code used by the PostScript- and PDF-compatible interpreters due to incorrect buffer size calculation

CVE-2019-10627 9.8 - Critical - November 21, 2019

Integer overflow to buffer overflow vulnerability in PostScript image handling code used by the PostScript- and PDF-compatible interpreters due to incorrect buffer size calculation. in PostScript and PDF printers that use IPS versions prior to 2019.2 in PostScript and PDF printers that use IPS versions prior to 2019.2

Buffer Overflow

qpopper POP server creates lock files with predictable names, which

CVE-2000-1198 5.5 - Medium - August 31, 2001

qpopper POP server creates lock files with predictable names, which allows local users to cause a denial of service for other users (lack of mail access) by creating lock files for other mail boxes.

Improper Locking

Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.

CVE-1999-0427 - May 01, 2000

Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.

Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file

CVE-2000-0342 7.5 - High - April 28, 2000

Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka "Stealth Attachment."

insecure temporary file

Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others

CVE-1999-1016 - August 27, 1999

Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell.

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD), Icons by Icons8. Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.