Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
msm8909_firmware Vendor: qualcomm

About This Product

msm8909_firmware is a software product offered by qualcomm. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 116 known vulnerabilities affecting qualcomm msm8909_firmware. This includes 51 critical-severity issues and 49 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2019 to 2020, indicating a recent active security attention. 16 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2019-2327 2019-07-25 2024-11-21 9.8 10.0 Likely
CVE-2019-10565 2019-11-06 2024-11-21 9.8 7.5 Likely
CVE-2019-2302 2019-11-06 2024-11-21 9.8 7.5 Likely
CVE-2018-13916 2019-11-21 2024-11-21 7.8 7.2 Unknown
CVE-2019-10490 2019-11-21 2024-11-21 5.5 2.1 Unknown
CVE-2019-10503 2019-11-21 2024-11-21 7.8 4.6 Unknown
CVE-2019-2266 2019-11-21 2024-11-21 7.8 4.6 Unknown
CVE-2019-2271 2019-11-21 2024-11-21 9.8 10.0 Likely
CVE-2019-2289 2019-11-21 2024-11-21 9.8 10.0 Likely
CVE-2019-2295 2019-11-21 2024-11-21 5.5 2.1 Unknown
CVE-2019-2303 2019-11-21 2024-11-21 9.8 7.5 Likely
CVE-2019-2315 2019-11-21 2024-11-21 7.8 7.2 Unknown
CVE-2019-2335 2019-11-21 2024-11-21 7.5 5.0 Likely
CVE-2019-10485 2019-12-12 2024-11-21 7.5 7.8 Likely
CVE-2019-10493 2019-12-12 2024-11-21 9.8 10.0 Likely
CVE-2019-10494 2019-12-12 2024-11-21 8.1 4.4 Unknown
CVE-2019-10511 2019-12-12 2024-11-21 9.8 10.0 Likely
CVE-2019-10555 2019-12-12 2024-11-21 7.8 4.6 Unknown
CVE-2019-10559 2019-12-12 2024-11-21 9.8 7.5 Likely
CVE-2019-10571 2019-12-12 2024-11-21 7.8 4.6 Unknown
CVE-2019-10592 2019-12-12 2024-11-21 7.8 4.6 Unknown
CVE-2019-2288 2019-12-12 2024-11-21 7.8 7.2 Unknown
CVE-2019-2310 2019-12-12 2024-11-21 7.5 5.0 Likely
CVE-2019-2320 2019-12-12 2024-11-21 9.8 10.0 Likely
CVE-2019-2321 2019-12-12 2024-11-21 7.8 7.2 Unknown
CVE-2019-2337 2019-12-12 2024-11-21 7.5 7.8 Likely
CVE-2019-10480 2019-12-18 2024-11-21 7.8 7.2 Unknown
CVE-2019-10482 2019-12-18 2024-11-21 5.9 7.1 Likely
CVE-2019-10487 2019-12-18 2024-11-21 9.8 10.0 Likely
CVE-2019-10500 2019-12-18 2024-11-21 9.8 10.0 Likely
CVE-2019-10513 2019-12-18 2024-11-21 5.5 4.9 Unknown
CVE-2019-10516 2019-12-18 2024-11-21 9.8 10.0 Likely
CVE-2019-10517 2019-12-18 2024-11-21 7.8 4.6 Unknown
CVE-2019-10518 2019-12-18 2024-11-21 7.8 4.6 Unknown
CVE-2019-10525 2019-12-18 2024-11-21 9.8 10.0 Likely
CVE-2019-10544 2019-12-18 2024-11-21 7.8 4.6 Unknown
CVE-2019-10595 2019-12-18 2024-11-21 7.8 7.2 Unknown
CVE-2019-10600 2019-12-18 2024-11-21 7.8 7.2 Unknown
CVE-2019-10605 2019-12-18 2024-11-21 7.8 7.2 Unknown
CVE-2019-10607 2019-12-18 2024-11-21 7.8 7.2 Unknown
CVE-2019-2242 2019-12-18 2024-11-21 9.8 10.0 Likely
CVE-2019-10532 2020-01-21 2024-11-21 9.8 10.0 Likely
CVE-2019-10548 2020-01-21 2024-11-21 7.8 7.2 Unknown
CVE-2019-10561 2020-01-21 2024-11-21 5.5 5.0 Likely
CVE-2019-10578 2020-01-21 2024-11-21 7.5 7.8 Likely
CVE-2019-10579 2020-01-21 2024-11-21 9.1 9.4 Likely
CVE-2019-10611 2020-01-21 2024-11-21 9.8 10.0 Likely
CVE-2019-14003 2020-01-21 2024-11-21 7.5 7.8 Likely
CVE-2019-14004 2020-01-21 2024-11-21 9.8 10.0 Likely
CVE-2019-14005 2020-01-21 2024-11-21 9.8 10.0 Likely
CVE-2019-14006 2020-01-21 2024-11-21 9.8 10.0 Likely
CVE-2019-14013 2020-01-21 2024-11-21 9.8 10.0 Likely
CVE-2019-14016 2020-01-21 2024-11-21 9.8 10.0 Likely
CVE-2019-14017 2020-01-21 2024-11-21 9.8 10.0 Likely
CVE-2019-10549 2020-03-05 2024-11-21 7.5 7.8 Likely
CVE-2019-10550 2020-03-05 2024-11-21 9.1 9.4 Likely
CVE-2019-10552 2020-03-05 2024-11-21 9.1 9.4 Likely
CVE-2019-10553 2020-03-05 2024-11-21 9.1 9.4 Likely
CVE-2019-10554 2020-03-05 2024-11-21 9.1 9.4 Likely
CVE-2019-10577 2020-03-05 2024-11-21 9.1 9.4 Likely
CVE-2019-10586 2020-03-05 2024-11-21 9.8 10.0 Likely
CVE-2019-10587 2020-03-05 2024-11-21 9.8 10.0 Likely
CVE-2019-10593 2020-03-05 2024-11-21 9.8 10.0 Likely
CVE-2019-10594 2020-03-05 2024-11-21 9.8 10.0 Likely
CVE-2019-10616 2020-03-05 2024-11-21 5.5 4.9 Unknown
CVE-2019-14095 2020-03-05 2024-11-21 9.8 10.0 Likely
CVE-2019-2317 2020-03-05 2024-11-21 9.8 5.0 Likely
CVE-2019-10483 2020-04-16 2024-11-21 5.5 2.1 Unknown
CVE-2019-10551 2020-04-16 2024-11-21 9.1 9.4 Likely
CVE-2019-10574 2020-04-16 2024-11-21 7.1 3.6 Unknown
CVE-2019-10588 2020-04-16 2024-11-21 9.8 10.0 Likely
CVE-2019-10608 2020-04-16 2024-11-21 5.5 2.1 Unknown
CVE-2019-10609 2020-04-16 2024-11-21 9.8 10.0 Likely
CVE-2019-10610 2020-04-16 2024-11-21 9.1 9.4 Likely
CVE-2019-14007 2020-04-16 2024-11-21 5.5 4.9 Unknown
CVE-2019-14009 2020-04-16 2024-11-21 7.8 7.2 Unknown
CVE-2019-14011 2020-04-16 2024-11-21 9.1 9.4 Likely
CVE-2019-14012 2020-04-16 2024-11-21 7.5 7.8 Likely
CVE-2019-14018 2020-04-16 2024-11-21 7.8 7.2 Unknown
CVE-2019-14019 2020-04-16 2024-11-21 9.1 9.4 Likely
CVE-2019-14020 2020-04-16 2024-11-21 9.1 9.4 Likely
CVE-2019-14021 2020-04-16 2024-11-21 7.8 7.2 Unknown
CVE-2019-14022 2020-04-16 2024-11-21 7.5 7.8 Likely
CVE-2019-14033 2020-04-16 2024-11-21 9.1 9.4 Likely
CVE-2019-14067 2020-06-02 2024-11-21 5.5 2.1 Unknown
CVE-2019-14077 2020-06-02 2024-11-21 7.8 4.6 Unknown
CVE-2019-14078 2020-06-02 2024-11-21 7.8 4.6 Unknown
CVE-2019-14062 2020-06-22 2024-11-21 9.8 10.0 Likely
CVE-2019-14073 2020-06-22 2024-11-21 9.8 7.5 Likely
CVE-2019-14076 2020-06-22 2024-11-21 7.8 4.6 Unknown
CVE-2019-14080 2020-06-22 2024-11-21 9.8 7.5 Likely
CVE-2019-14094 2020-06-22 2024-11-21 7.8 4.6 Unknown
CVE-2020-3614 2020-06-22 2024-11-21 9.8 7.5 Likely
CVE-2019-14101 2020-07-30 2024-11-21 7.1 3.6 Unknown
CVE-2019-10527 2020-09-08 2024-11-21 7.8 7.2 Unknown
CVE-2019-10615 2020-09-08 2024-11-21 7.8 7.2 Unknown
CVE-2019-13994 2020-09-08 2024-11-21 7.8 7.2 Unknown
CVE-2019-13995 2020-09-08 2024-11-21 7.8 7.2 Unknown
CVE-2019-13998 2020-09-08 2024-11-21 7.8 7.2 Unknown
CVE-2019-13999 2020-09-08 2024-11-21 7.8 7.2 Unknown
CVE-2019-14052 2020-09-08 2024-11-21 9.8 10.0 Likely
CVE-2019-14065 2020-09-08 2024-11-21 7.8 7.2 Unknown
CVE-2019-14074 2020-09-08 2024-11-21 7.8 7.2 Unknown
CVE-2019-14115 2020-09-08 2024-11-21 5.5 2.1 Unknown
CVE-2020-3619 2020-09-08 2024-11-21 7.0 6.9 Unknown
CVE-2020-3620 2020-09-08 2024-11-21 5.5 2.1 Unknown
CVE-2020-3621 2020-09-08 2024-11-21 5.5 4.9 Unknown
CVE-2020-3622 2020-09-08 2024-11-21 7.8 4.6 Unknown
CVE-2020-3624 2020-09-08 2024-11-21 7.8 4.6 Unknown
CVE-2020-3643 2020-09-08 2024-11-21 5.5 2.1 Unknown
CVE-2020-3644 2020-09-08 2024-11-21 5.5 2.1 Unknown
CVE-2020-11123 2020-11-12 2024-11-21 5.5 2.1 Unknown
CVE-2020-11132 2020-11-12 2024-11-21 7.1 3.6 Unknown
CVE-2020-11193 2020-11-12 2024-11-21 9.8 10.0 Likely
CVE-2020-11196 2020-11-12 2024-11-21 9.8 10.0 Likely
CVE-2020-3639 2020-11-12 2024-11-21 9.8 10.0 Likely

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for qualcomm msm8909_firmware by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.