Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
qcc5100_firmware Vendor: qualcomm

About This Product

qcc5100_firmware is a software product offered by qualcomm. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 71 known vulnerabilities affecting qualcomm qcc5100_firmware. This includes 8 critical-severity issues and 40 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2022 to 2023, indicating a recent active security attention. 23 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2022-25662 2022-10-19 2025-05-15 5.3 - -
CVE-2022-25664 2022-10-19 2025-05-15 6.2 - -
CVE-2022-25666 2022-10-19 2025-05-09 6.7 - -
CVE-2022-25687 2022-10-19 2025-05-09 7.3 - -
CVE-2022-25718 2022-10-19 2025-05-09 9.1 - -
CVE-2022-25720 2022-10-19 2025-05-09 9.8 - -
CVE-2022-25736 2022-10-19 2025-05-09 7.5 - -
CVE-2022-25748 2022-10-19 2025-04-22 9.8 - -
CVE-2022-25749 2022-10-19 2025-04-22 7.5 - -
CVE-2022-33214 2022-10-19 2025-05-14 8.4 - -
CVE-2022-25676 2022-11-15 2025-04-22 6.8 - -
CVE-2022-25724 2022-11-15 2025-04-22 8.4 - -
CVE-2022-25741 2022-11-15 2025-04-22 7.5 - -
CVE-2022-25743 2022-11-15 2025-04-22 8.4 - -
CVE-2022-33237 2022-11-15 2025-04-22 7.5 - -
CVE-2022-33239 2022-11-15 2025-04-22 7.5 - -
CVE-2022-25682 2022-12-13 2025-04-22 8.4 - -
CVE-2022-25685 2022-12-13 2025-04-22 7.5 - -
CVE-2022-25695 2022-12-13 2025-04-22 8.4 - -
CVE-2022-25711 2022-12-13 2025-04-22 6.7 - -
CVE-2022-25712 2022-12-13 2025-04-22 6.7 - -
CVE-2022-33235 2022-12-13 2025-04-22 8.2 - -
CVE-2022-33238 2022-12-13 2025-04-22 7.5 - -
CVE-2022-33268 2022-12-13 2025-04-22 8.2 - -
CVE-2022-22088 2023-01-09 2025-04-09 9.8 - -
CVE-2022-33255 2023-01-09 2025-04-09 8.2 - -
CVE-2022-33266 2023-01-09 2025-04-09 5.9 - -
CVE-2022-33284 2023-01-09 2025-04-09 8.2 - -
CVE-2022-33285 2023-01-09 2025-04-09 7.5 - -
CVE-2022-33286 2023-01-09 2025-04-09 7.5 - -
CVE-2022-33300 2023-01-09 2025-04-09 8.4 - -
CVE-2022-40516 2023-01-09 2025-04-09 8.4 - -
CVE-2022-40517 2023-01-09 2025-04-09 8.4 - -
CVE-2022-40519 2023-01-09 2025-04-09 6.8 - -
CVE-2022-33233 2023-02-12 2024-11-21 7.8 - -
CVE-2022-33243 2023-02-12 2024-11-21 8.4 - -
CVE-2022-33248 2023-02-12 2024-11-21 7.8 - -
CVE-2022-33271 2023-02-12 2024-11-21 8.2 - -
CVE-2022-33277 2023-02-12 2024-11-21 8.4 - -
CVE-2022-34145 2023-02-12 2024-11-21 7.5 - -
CVE-2022-40512 2023-02-12 2024-11-21 7.5 - -
CVE-2022-40514 2023-02-12 2024-11-21 9.8 - -
CVE-2022-22075 2023-03-10 2024-11-21 6.2 - -
CVE-2022-25655 2023-03-10 2024-11-21 8.4 - -
CVE-2022-25694 2023-03-10 2024-11-21 8.4 - -
CVE-2022-25705 2023-03-10 2024-11-21 7.8 - -
CVE-2022-33213 2023-03-10 2024-11-21 7.5 - -
CVE-2022-33242 2023-03-10 2024-11-21 7.8 - -
CVE-2022-33257 2023-03-10 2024-11-21 9.3 - -
CVE-2022-33260 2023-03-10 2024-11-21 5.9 - -
CVE-2022-33278 2023-03-10 2024-11-21 7.8 - -
CVE-2022-40515 2023-03-10 2024-11-21 7.3 - -
CVE-2022-40531 2023-03-10 2024-11-21 8.4 - -
CVE-2022-40537 2023-03-10 2024-11-21 7.3 - -
CVE-2022-40539 2023-03-10 2024-11-21 8.4 - -
CVE-2022-40510 2023-08-08 2024-11-21 9.8 - -
CVE-2023-21627 2023-08-08 2024-11-21 6.7 - -
CVE-2023-21647 2023-08-08 2024-11-21 6.5 - -
CVE-2023-21648 2023-08-08 2024-11-21 6.7 - -
CVE-2023-21649 2023-08-08 2024-11-21 6.7 - -
CVE-2023-21650 2023-08-08 2024-11-21 6.7 - -
CVE-2023-21651 2023-08-08 2024-11-21 9.3 - -
CVE-2023-21652 2023-08-08 2024-11-21 7.7 - -
CVE-2022-33220 2023-09-05 2024-11-21 5.1 - -
CVE-2022-40524 2023-09-05 2024-11-21 6.7 - -
CVE-2023-21636 2023-09-05 2024-11-21 6.7 - -
CVE-2023-21644 2023-09-05 2024-11-21 6.7 - -
CVE-2023-21654 2023-09-05 2024-11-21 6.7 - -
CVE-2023-21655 2023-09-05 2024-11-21 6.7 - -
CVE-2023-21663 2023-09-05 2024-11-21 6.7 - -
CVE-2023-21667 2023-09-05 2024-11-21 6.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for qualcomm qcc5100_firmware by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.