Qualcomm Snapdragon Auto Vulnerabilities

Timeline

The analysis of the timeline helps to identify the required approach and handling of single items and item collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Prioritizing items becomes possible.

Last Year

The analysis of the timeline helps to identify the required approach and handling of single items and item collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Prioritizing items becomes possible.

Version

QCS605334
MSM8996AU292
SDM660272
SDM630245
SDA660242

Grouping all affected versions of a specific product helps to determine existing issues. This makes it possible to determine vendors and products which need attention when it comes to remediations.

Remediation

Official fix1006
Temporary fix0
Workaround0
Not available0
Not defined112

Vendors and researchers are eager to find countermeasures to mitigate security vulnerabilities. These can be distinguished between multiple forms and levels of remediation which influence risks differently.

Exploitability

Attacked5
Highly functional0
Functional0
Proof-of-Concept9
Unproven0
Not defined1104

Researcher and attacker which are looking for security vulnerabilities try to exploit them for academic purposes or personal gain. The level and quality of exploitability can be distinguished to determine simplicity and strength of attacks.

Access Vector

Not Defined0
Physical4
Local566
Adjacent134
Network414

The approach a vulnerability it becomes important to use the expected access vector. This is typically via the network, local, or physically even.

Authentication

Not Defined0
High48
Low678
None392

To exploit a vulnerability a certail level of authentication might be required. Vulnerabilities without such a requirement are much more popular.

User Interaction

Not Defined0
Required30
None1088

Some attack scenarios require some user interaction by a victim. This is typical for phishing, social engineering and cross site scripting attacks.

C3BM Index

Our unique C3BM Index (CVSSv3 Base Meta Index) cumulates the CVSSv3 Meta Base Scores of all entries over time. Comparing this index to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

Last Year

Our unique C3BM Index (CVSSv3 Base Meta Index) cumulates the CVSSv3 Meta Base Scores of all entries over time. Comparing this index to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

CVSSv3 Base

≤10
≤21
≤30
≤48
≤545
≤6123
≤7338
≤8360
≤9211
≤1032

The Common Vulnerability Scoring System (CVSS) is an industry standard to define the characteristics and impacts of security vulnerabilities. The base score represents the intrinsic aspects that are constant over time and across user environments. Our unique meta score merges all available scores from different sources to aggregate to the most reliable result.

CVSSv3 Temp

≤10
≤21
≤30
≤49
≤551
≤6140
≤7339
≤8392
≤9154
≤1032

The Common Vulnerability Scoring System (CVSS) uses temp scores to reflect the characteristics of a vulnerability that may change over time but not across user environments. This includes reporting confidence, exploitability and remediation levels. We do also provide our unique meta score for temp scores, even though other sources rarely publish them.

VulDB

≤10
≤21
≤36
≤469
≤525
≤6394
≤778
≤8478
≤933
≤1034

The moderation team is always defining the base vector and base score for an entry. These and all other available scores are used to generate the meta score.

NVD

≤10
≤20
≤30
≤40
≤51
≤672
≤732
≤8358
≤912
≤10204

The National Vulnerability Database (NVD) is also defining CVSS vectors and scores. These are usually not complete and might differ from VulDB scores.

CNA

≤10
≤20
≤30
≤40
≤51
≤616
≤774
≤8206
≤9118
≤1024

A CVE Numbering Authority (CNA) is responsible for assigning new CVE entries. They might also include a CVSS score. These are usually not complete and might differ from VulDB scores.

Vendor

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

Some vendors are willing to publish their own CVSS vectors and scores for vulnerabilities in their products. The coverage varies from vendor to vendor.

Research

≤10
≤20
≤30
≤40
≤50
≤60
≤70
≤80
≤90
≤100

There are sometimes also security researcher which provide their own CVSS vectors and scores for vulnerabilities they have found and published.

Exploit 0-day

<1k2
<2k5
<5k76
<10k460
<25k528
<50k47
<100k0
≥100k0

The moderation team is working with the threat intelligence team to determine prices for exploits. Our unique algorithm is used to identify the 0-day prices for an exploit, before it got distributed or became public. Calculated prices are aligned to prices disclosed by vulnerability broker and compared to prices we see on exploit markets.

Exploit Today

<1k734
<2k93
<5k203
<10k64
<25k24
<50k0
<100k0
≥100k0

The 0-day prices do not consider time-relevant factors. The today price does reflect price impacts like disclosure of vulnerability details, alternative exploits, availability of countermeasures. These dynamic aspects might decrease the exploit prices over time. Under certain circumstances this happens very fast.

Exploit Market Volume

Our unique calculation of exploit prices makes it possible to forecast the expected exploit market volume. The calculated prices for all possible 0-day expoits are cumulated for this task. Comparing the volume to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

Last Year

Our unique calculation of exploit prices makes it possible to forecast the expected exploit market volume. The calculated prices for all possible 0-day expoits are cumulated for this task. Comparing the volume to the amount of disclosed vulnerabilities helps to pinpoint the most important events.

🔴 CTI Activities

Our unique Cyber Threat Intelligence aims to determine the ongoing research of actors to anticipiate their acitivities. Observing exploit markets on the Darknet, discussions of vulnerabilities on mailinglists, and exchanges on social media makes it possible to identify planned attacks. Monitored actors and activities are classified whether they are offensive or defensive. They are also weighted as some actors are well-known for certain products and technologies. And some of their disclosures might contain more or less details about technical aspects and personal context. The world map highlights active actors in real-time.

Affected Versions (704): 4 Gen 1 Mobile Platform, 4 Gen 2 Mobile Platform, 6 Gen 1 Mobile Platform, 7 Gen 1 Mobile Platform, 7+ Gen 2 Mobile Platform, 7c+ Gen 3 Compute, 7c Compute Platform (SC7180-AC), 7c Gen 2 Compute Platform (SC7180-AD) "Rennell Pro", 8 Gen 1 Mobile Platform, 8 Gen 2 Mobile Platform, 8 Gen 3 Mobile Platform, 8+ Gen 1 Mobile Platform, 8+ Gen 2 Mobile Platform, 8c Compute Platform (SC8180X-AD) "Poipu Lite", 8c Compute Platform (SC8180XP-AD) "Poipu Lite", 8cx Compute Platform (SC8180X-AA, 8cx Compute Platform (SC8180XP-AC, 8cx Gen 2 5G Compute Platform (SC8180X-AC, 8cx Gen 2 5G Compute Platform (SC8180XP-AA, 8cx Gen 3 Compute Platform (SC8280XP-AB, 12, 16, 52, 208 Processor, 210 Processor, 212 Mobile Platform, 212-SD 205, 315 5G IoT Modem, 425 Mobile Platform, 427 Mobile Platform, 429 Mobile Platform, 430 Mobile Platform, 435 Mobile Platform, 439 Mobile Platform, 450 Mobile Platform, 460 Mobile Platform, 480 5G Mobile Platform, 480+ 5G Mobile Platform (SM4350-AC), 625 Mobile Platform, 626 Mobile Platform, 630 Mobile Platform, 632 Mobile Platform, 636 Mobile Platform, 660 Mobile Platform, 662 Mobile Platform, 665 Mobile Platform, 670 Mobile Platform, 675 Mobile Platform, 678 Mobile Platform (SM6150-AC), 680 4G Mobile Platform, 685 4G Mobile Platform (SM6225-AD), 690 5G Mobile Platform, 695 5G Mobile Platform, 710 Mobile Platform, 712 Mobile Platform, 720G Mobile Platform, 730 Mobile Platform (SM7150-AA), 730G Mobile Platform (SM7150-AB), 732G Mobile Platform (SM7150-AC), 750G 5G Mobile Platform, 765 5G Mobile Platform (SM7250-AA), 765G 5G Mobile Platform (SM7250-AB), 768G 5G Mobile Platform (SM7250-AC), 778G+ 5G Mobile Platform (SM7325-AE), 778G 5G Mobile Platform, 780G 5G Mobile Platform, 782G Mobile Platform (SM7325-AF), 820 Automotive Platform, 835 Mobile PC Platform, 845 Mobile Platform, 850 Mobile Compute Platform, 855 Mobile Platform, 855+, 860 Mobile Platform (SM8150-AC), 865 5G Mobile Platform, 865+ 5G Mobile Platform (SM8250-AB), 870 5G Mobile Platform (SM8250-AC), 888 5G Mobile Platform, 888+ 5G Mobile Platform (SM8350-AC), 1100 Wearable Platform, 1200 Wearable Platform, 9205 LTE Modem, 9206 LTE Modem, 9207 LTE Modem, AB), AF) "Poipu Pro", APQ8009, APQ8009W, APQ8016, APQ8017, APQ8037, APQ8039, APQ8052, APQ8053, APQ8056, APQ8064, APQ8064AU, APQ8076, APQ8096, APQ8096AU, APQ8096SG, APQ8098, AQT1000, AR1 Gen 1 Platform, AR1 Gen 1 Platform "Luna1", AR2 Gen 1 Platform, AR6003, AR8031, AR8035, AR9344, AR9380, Agatti, Auto 4G Modem, Auto 4GModem, Auto 5G Modem-RF, Auto 5G Modem-RF Gen 2, BB), Bitra, C-V2X 9150, CSR8811, CSRA6620, CSRA6640, CSRB31024, FSM10055, FSM10056, FSM20055, FSM20056, FastConnect 6200, FastConnect 6700, FastConnect 6800, FastConnect 6900, FastConnect 7800, Flight RB5 5G Platform, Home Hub 100 Platform, IPQ4018, IPQ4019, IPQ4028, IPQ4029, IPQ5010, IPQ5018, IPQ5028, IPQ5300, IPQ5302, IPQ5312, IPQ5332, IPQ5424, IPQ6000, IPQ6005, IPQ6010, IPQ6018, IPQ6028, IPQ8064, IPQ8065, IPQ8068, IPQ8070, IPQ8070A, IPQ8071, IPQ8071A, IPQ8072, IPQ8072A, IPQ8074, IPQ8074A, IPQ8076, IPQ8076A, IPQ8078, IPQ8078A, IPQ8173, IPQ8174, IPQ9008, IPQ9048, IPQ9554, IPQ9570, IPQ9574, Immersive Home 214 Platform, Immersive Home 216 Platform, Immersive Home 316 Platform, Immersive Home 318 Platform, Immersive Home 326 Platform, Immersive Home 3210 Platform, Kamorta, MDM, MDM8207, MDM8215, MDM9150, MDM9205, MDM9205S, MDM9206, MDM9207, MDM9207C, MDM9215, MDM9230, MDM9250, MDM9310, MDM9330, MDM9607, MDM9615, MDM9625, MDM9628, MDM9630, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8108, MSM8208, MSM8209, MSM8608, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8952, MSM8953, MSM8956, MSM8976, MSM8976SG, MSM8996, MSM8996AU, MSM8996SG, MSM8998, Nicobar, PM8937, PMP8074, QAM8255P, QAM8295P, QAM8620P, QAM8650P, QAM8775P, QAMSRV1H, QAMSRV1M, QC, QCA0000, QCA1062, QCA1064, QCA2062, QCA2064, QCA2065, QCA2066, QCA4004, QCA4010, QCA4024, QCA4531, QCA6174, QCA6174A, QCA6175A, QCA6310, QCA6320, QCA6335, QCA6390, QCA6391, QCA6420, QCA6421, QCA6426, QCA6430, QCA6431, QCA6436, QCA6554A, QCA6564, QCA6564A, QCA6564AU, QCA6574, QCA6574A, QCA6574AU, QCA6584, QCA6584AU, QCA6595, QCA6595AU, QCA6678AQ, QCA6688AQ, QCA6696, QCA6698AQ, QCA6777AQ, QCA6787AQ, QCA6797AQ, QCA7500, QCA8072, QCA8075, QCA8080, QCA8081, QCA8082, QCA8084, QCA8085, QCA8101, QCA8102, QCA8111, QCA8112, QCA8337, QCA8384, QCA8385, QCA8386, QCA9367, QCA9377, QCA9378, QCA9379, QCA9531, QCA9558, QCA9880, QCA9886, QCA9888, QCA9889, QCA9898, QCA9980, QCA9984, QCA9985, QCA9986, QCA9990, QCA9992, QCA9994, QCC710, QCC711, QCC2073, QCC2076, QCC7225, QCC7226, QCC7228, QCF8000, QCF8000SFP, QCF8001, QCM, QCM2150, QCM2290, QCM4290, QCM4325, QCM4490, QCM5430, QCM6125, QCM6490, QCM8550, QCN5021, QCN5022, QCN5024, QCN5052, QCN5054, QCN5121, QCN5122, QCN5124, QCN5152, QCN5154, QCN5164, QCN5224, QCN5502, QCN6023, QCN6024, QCN6100, QCN6102, QCN6112, QCN6122, QCN6132, QCN6224, QCN6274, QCN6402, QCN6412, QCN6422, QCN6432, QCN7605, QCN7606, QCN9000, QCN9001, QCN9002, QCN9003, QCN9011, QCN9012, QCN9013, QCN9022, QCN9024, QCN9070, QCN9072, QCN9074, QCN9100, QCN9160, QCN9274, QCS404, QCS405, QCS410, QCS603, QCS605, QCS610, QCS615, QCS2290, QCS4290, QCS4490, QCS5430, QCS6125, QCS6490, QCS7230, QCS8155, QCS8250, QCS8300, QCS8550, QCS9100, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QEP8111, QET4101, QFW7114, QFW7124, QM215, QMP1000, QRB5165, QRB5165M, QRB5165N, QRU1032, QRU1052, QRU1062, QSM8250, QSM8350, QSW8573, QTS110, QXM8083, Qualcomm 205 Mobile Platform, Qualcomm 215, Qualcomm 215 Mobile Platform, Qualcomm 215SD 429, Qualcomm Video Collaboration VC1 Platform, Qualcomm Video Collaboration VC3 Platform, Qualcomm Video Collaboration VC5 Platform, Rennell, Robotics RB2 Platform, Robotics RB3 Platform, Robotics RB5 Platform, SA, SA415M, SA515M, SA2150P, SA4150P, SA4155P, SA6145P, SA6150P, SA6155, SA6155P, SA7255P, SA7775P, SA8145P, SA8150P, SA8155, SA8155P, SA8195P, SA8255P, SA8295P, SA8530P, SA8540P, SA8620P, SA8650P, SA8770P, SA8775P, SA9000P, SC7180, SC8180X, SC8180X+SDX55, SC8180XP, SC8380XP, SD, SD 8 Gen1 5G, SD 8CX, SD 205, SD205, SD 210, SD210, SD 210-SD, SD 212, SD 215, SD 410, SD 410-12, SD 415, SD 425, SD 427, SD 429, SD 430, SD 435, SD 439, SD 439 , SD 450, SD460, SD480, SD 600, SD 615, SD 615-16, SD 625, SD626, SD 632, SD 636, SD 650, SD 650-52, SD660, SD662, SD 665, SD670, SD 670, SD 675, SD675, SD 710, SD 712, SD730, SD 730, SD765, SD765G, SD768G, SD780G, SD 800, SD820, SD 820, SD 820A, SD821, SD835, SD 835, SD 845, SD 845 , SD 850, SD855, SD 855, SD865 5G, SD870, SD888, SD888 5G, SDA429W, SDA640, SDA660, SDA670, SDA845, SDA855, SDM429, SDM429W, SDM439, SDM450, SDM455, SDM630, SDM632, SDM636, SDM640, SDM660, SDM670, SDM710, SDM712, SDM830, SDM845, SDM850, SDM1000, SDW2500, SDX20, SDX20M, SDX24, SDX50M, SDX55, SDX55M, SDX57M, SDX61, SDX65M, SDX71M, SDX80M, SDXR2 5G, SG4150P, SG8275P, SM, SM73, SM4125, SM4250, SM4250P, SM4635, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6225, SM6250, SM6250P, SM6350, SM6370, SM6375, SM6650, SM6650P, SM7125, SM7150, SM7150P, SM7225, SM7250, SM7250P, SM7315, SM7325P, SM7435, SM7635, SM7675, SM7675P, SM8150, SM8150P, SM8250, SM8350, SM8350P, SM8550P, SM8635, SM8635P, SM8650Q, SM8735, SM8750, SM8750P, SRV1H, SRV1L, SRV1M, SSG21, SSG2115P, SSG2125P, SW5100, SW5100P, SXR1120, SXR1130, SXR1230P, SXR2130, SXR2130P, SXR2230P, SXR2250P, SXR2330P, Saipan, Smart Audio 200 Platform, Smart Audio 400 Platform, Smart Display 200 Platform (APQ5053-AA), Snapdragon_High_Med_2016, Ta, TalynPlus, Vision Int, Vision Intelligence 100 Platform (APQ8053-AA), Vision Intelligence 200 Platform (APQ8053-AC), Vision Intelligence 300 Platform, Vision Intelligence 400 Platform, W5+ Gen, W5+ Gen 1 Wearable Platform, WCD9306, WCD9326, WCD9330, WCD9335, WCD9340, WCD9341, WCD9360, WCD9370, WCD9371, WCD9375, WCD9378, WCD9380, WCD9385, WCD9390, WCD9395, WCN398, WCN3610, WCN3615, WCN3620, WCN3660B, WCN3680, WCN3680B, WCN3910, WCN3950, WCN3980, WCN3988, WCN3990, WCN3991, WCN3998, WCN3999, WCN6450, WCN6650, WCN6740, WCN6750, WCN6755, WCN6850, WCN6851, WCN6855, WCN6856, WCN7750, WCN7860, WCN7861, WCN7880, WCN7881, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H, Wear 1300 Platform, Wear 2100 Platform, Wear 2500 Platform, Wear 3100 Platform, Wear 4100+ Platform, X12 LTE Modem, X24 LTE Modem, X35 5G Modem-RF System, X50 5G Modem-RF System, X55 5G Modem-RF System, X62 5G Modem-RF System, X65 5G Modem-RF System, X70 Modem-RF System, X72 5G Modem-RF System, X75 5G Modem-RF System, XR1 Platform, XR2 5G Platform, XR2+ Gen 1 Platform

Link to Product Website: https://www.qualcomm.com/

Software Type: Chip Software

PublishedBaseTempVulnerability0dayTodayExpCouCTICVE
06/03/20257.57.3Qualcomm Snapdragon Auto Response Buffer buffer over-read$5k-$25k$0-$5kNot definedOfficial fix0.06CVE-2025-27029
06/03/20255.95.8Qualcomm Snapdragon Auto ioctl Command use after free$5k-$25k$0-$5kNot definedOfficial fix0.05CVE-2024-53015
06/03/20255.95.8Qualcomm Snapdragon Auto Voice Call Registration buffer overflow$5k-$25k$0-$5kNot definedOfficial fix0.05CVE-2024-53013
06/03/20257.87.6Qualcomm Snapdragon Auto HLOS memory corruption$5k-$25k$0-$5kNot definedOfficial fix0.00CVE-2024-53010
06/03/20257.57.3Qualcomm Snapdragon Auto Beacon Frame buffer over-read$5k-$25k$0-$5kNot definedOfficial fix0.05CVE-2025-21463
06/03/20257.77.6Qualcomm Snapdragon Auto VoLTE/VoWiFi buffer over-read$5k-$25k$0-$5kNot definedOfficial fix0.06CVE-2024-53026
06/03/20257.77.6Qualcomm Snapdragon Auto RTCP Packet buffer over-read$5k-$25k$0-$5kNot definedOfficial fix0.00CVE-2024-53021
06/03/20257.77.6Qualcomm Snapdragon Auto RTP Packet buffer over-read$5k-$25k$0-$5kNot definedOfficial fix0.05CVE-2024-53020
06/03/20257.77.6Qualcomm Snapdragon Auto RTP Header Length buffer over-read$5k-$25k$0-$5kNot definedOfficial fix0.04CVE-2024-53019
05/06/20257.87.6Qualcomm Snapdragon Auto FW Response out-of-bounds write$5k-$25k$0-$5kNot definedOfficial fix0.00CVE-2025-21468
05/06/20257.87.6Qualcomm Snapdragon Auto FW Response out-of-bounds write$5k-$25k$0-$5kNot definedOfficial fix0.04CVE-2025-21467
05/06/20257.87.6Qualcomm Snapdragon Auto memory corruption$5k-$25k$0-$5kNot definedOfficial fix0.07CVE-2025-21460
05/06/20257.57.3Qualcomm Snapdragon Auto buffer over-read$5k-$25k$0-$5kNot definedOfficial fix0.08CVE-2025-21459
05/06/20257.87.6Qualcomm Snapdragon Auto Data Structure use after free$5k-$25k$0-$5kNot definedOfficial fix0.06CVE-2025-21453
05/06/20257.57.3Qualcomm Snapdragon Auto OTA buffer over-read$5k-$25k$0-$5kNot definedOfficial fix0.06CVE-2024-49847
05/06/20257.77.6Qualcomm Snapdragon Auto OTA message buffer over-read$5k-$25k$0-$5kNot definedOfficial fix0.05CVE-2024-49846
05/06/20257.87.6Qualcomm Snapdragon Auto FRS UDS Generation memory corruption$5k-$25k$0-$5kNot definedOfficial fix0.00CVE-2024-49845
05/06/20257.87.6Qualcomm Snapdragon Auto PlayReady Trusted Application memory corruption$5k-$25k$0-$5kNot definedOfficial fix0.00CVE-2024-49844
05/06/20257.87.6Qualcomm Snapdragon Auto API access control$5k-$25k$0-$5kNot definedOfficial fix0.00CVE-2024-49842
05/06/20257.87.6Qualcomm Snapdragon Auto error condition$5k-$25k$0-$5kNot definedOfficial fix0.08CVE-2024-49841
05/06/20257.87.6Qualcomm Snapdragon Auto Secure File out-of-bounds write$5k-$25k$0-$5kNot definedOfficial fix0.08CVE-2024-49835
05/06/20255.95.8Qualcomm Snapdragon Auto IOCTL Call buffer overflow$5k-$25k$0-$5kNot definedOfficial fix0.08CVE-2024-49830
05/06/20255.95.8Qualcomm Snapdragon Auto Sound Model Registration out-of-bounds write$5k-$25k$0-$5kNot definedOfficial fix0.06CVE-2024-45581
05/06/20257.87.6Qualcomm Snapdragon Auto/Snapdragon Compute IOCTL Request out-of-bounds write$5k-$25k$0-$5kNot definedOfficial fix0.10CVE-2025-21462
05/06/20257.87.6Qualcomm Snapdragon Auto Server Info Object use after free$5k-$25k$0-$5kNot definedOfficial fix0.07CVE-2024-45564
05/06/20256.66.4Qualcomm Snapdragon Auto IO Configuration out-of-range pointer offset$5k-$25k$0-$5kNot definedOfficial fix0.00CVE-2024-45570
05/06/20255.95.8Qualcomm Snapdragon Auto Server Info Object use after free$5k-$25k$0-$5kNot definedOfficial fix0.04CVE-2024-45562
04/07/20257.57.3Qualcomm Snapdragon Auto Action Frame buffer over-read$5k-$25k$0-$5kNot definedOfficial fix0.00CVE-2025-21448
04/07/20257.87.6Qualcomm Snapdragon Auto eAVB buffer overflow$5k-$25k$0-$5kNot definedOfficial fix0.11CVE-2025-21443
04/07/20257.57.3Qualcomm Snapdragon Auto Beacon buffer over-read$5k-$25k$0-$5kNot definedOfficial fix0.09CVE-2025-21435
04/07/20257.57.3Qualcomm Snapdragon Auto STA buffer over-read$5k-$25k$0-$5kNot definedOfficial fix0.09CVE-2025-21430
04/07/20257.57.3Qualcomm Snapdragon Auto STA buffer over-read$5k-$25k$0-$5kNot definedOfficial fix0.07CVE-2025-21429
04/07/20257.57.3Qualcomm Snapdragon Auto STA buffer over-read$5k-$25k$0-$5kNot definedOfficial fix0.08CVE-2025-21428
04/07/20256.36.2Qualcomm Snapdragon Auto HAB Process memory corruption$5k-$25k$0-$5kNot definedOfficial fix0.08CVE-2025-21425
04/07/20256.76.5Qualcomm Snapdragon Auto IOCTL Call use after free$5k-$25k$0-$5kNot definedOfficial fix0.07CVE-2024-49848
04/07/20254.03.9Qualcomm Snapdragon Auto toctou$0-$5k$0-$5kNot definedOfficial fix0.04CVE-2025-21431
04/07/20257.87.6Qualcomm Snapdragon Auto TME out-of-range pointer offset$5k-$25k$0-$5kNot definedOfficial fix0.06CVE-2024-45557
04/07/20257.57.3Qualcomm Snapdragon Auto EHT Operation Parser buffer over-read$5k-$25k$0-$5kNot definedOfficial fix0.04CVE-2025-21434
04/07/20257.87.6Qualcomm Snapdragon Auto IOCTL use after free$5k-$25k$0-$5kNot definedOfficial fix0.06CVE-2025-21437
04/07/20254.74.7Qualcomm Snapdragon Auto Gatekeeper weak authentication$0-$5k$0-$5kNot definedOfficial fix0.08CVE-2024-45551
04/07/20257.87.6Qualcomm Snapdragon Auto Header integer overflow to buffer overflow$5k-$25k$0-$5kNot definedOfficial fix0.19CVE-2025-21442
04/07/20257.77.6Qualcomm Snapdragon Auto RTCP Packet buffer over-read$5k-$25k$0-$5kNot definedOfficial fix0.07CVE-2024-45552
04/07/20255.95.8Qualcomm Snapdragon Auto IOCTL Call use after free$5k-$25k$0-$5kNot definedOfficial fix0.11CVE-2024-45544
04/07/20255.95.8Qualcomm Snapdragon Auto MSM Channel out-of-bounds write$5k-$25k$0-$5kNot definedOfficial fix0.00CVE-2024-45543
04/07/20255.95.8Qualcomm Snapdragon Auto IOCTP Map use after free$5k-$25k$0-$5kNot definedOfficial fix0.06CVE-2024-45540
04/07/20257.87.6Qualcomm Snapdragon Auto File Descriptor use after free$5k-$25k$0-$5kNot definedOfficial fix0.00CVE-2024-43066
04/07/20257.87.6Qualcomm Snapdragon Auto EEPROM toctou$5k-$25k$0-$5kNot definedOfficial fix0.05CVE-2024-43067
04/07/20256.26.1Qualcomm Snapdragon Auto RKP routine$5k-$25k$0-$5kNot definedOfficial fix0.12CVE-2024-43065
04/07/20256.56.4Qualcomm Snapdragon Auto MQ Channel Creation exposure of sensitive system information to an unauthorized control sphere$5k-$25k$0-$5kNot definedOfficial fix0.06CVE-2024-45549
04/07/20256.96.8Qualcomm Snapdragon Auto HLOS insufficient granularity of access control$5k-$25k$0-$5kNot definedOfficial fix0.08CVE-2024-33058

1068 more entries are not shown

more entries by Qualcomm

Do you want to use VulDB in your project?

Use the official API to access entries easily!