Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
qcm2150_firmware Vendor: qualcomm

About This Product

qcm2150_firmware is a software product offered by qualcomm. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 126 known vulnerabilities affecting qualcomm qcm2150_firmware. This includes 48 critical-severity issues and 69 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2019 to 2025, indicating a sustained research interest and ongoing security attention. 9 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-13916 2019-11-21 2024-11-21 7.8 7.2 Unknown
CVE-2019-2271 2019-11-21 2024-11-21 9.8 10.0 Likely
CVE-2019-2289 2019-11-21 2024-11-21 9.8 10.0 Likely
CVE-2019-2303 2019-11-21 2024-11-21 9.8 7.5 Likely
CVE-2019-2335 2019-11-21 2024-11-21 7.5 5.0 Likely
CVE-2019-10485 2019-12-12 2024-11-21 7.5 7.8 Likely
CVE-2019-10493 2019-12-12 2024-11-21 9.8 10.0 Likely
CVE-2019-10511 2019-12-12 2024-11-21 9.8 10.0 Likely
CVE-2019-2320 2019-12-12 2024-11-21 9.8 10.0 Likely
CVE-2019-2337 2019-12-12 2024-11-21 7.5 7.8 Likely
CVE-2019-10487 2019-12-18 2024-11-21 9.8 10.0 Likely
CVE-2019-10500 2019-12-18 2024-11-21 9.8 10.0 Likely
CVE-2019-10516 2019-12-18 2024-11-21 9.8 10.0 Likely
CVE-2019-10525 2019-12-18 2024-11-21 9.8 10.0 Likely
CVE-2019-2242 2019-12-18 2024-11-21 9.8 10.0 Likely
CVE-2019-14013 2020-01-21 2024-11-21 9.8 10.0 Likely
CVE-2019-14041 2020-02-07 2024-11-21 7.8 4.6 Unknown
CVE-2019-10549 2020-03-05 2024-11-21 7.5 7.8 Likely
CVE-2019-10550 2020-03-05 2024-11-21 9.1 9.4 Likely
CVE-2019-10552 2020-03-05 2024-11-21 9.1 9.4 Likely
CVE-2019-10553 2020-03-05 2024-11-21 9.1 9.4 Likely
CVE-2019-10554 2020-03-05 2024-11-21 9.1 9.4 Likely
CVE-2019-10577 2020-03-05 2024-11-21 9.1 9.4 Likely
CVE-2019-10586 2020-03-05 2024-11-21 9.8 10.0 Likely
CVE-2019-10587 2020-03-05 2024-11-21 9.8 10.0 Likely
CVE-2019-10593 2020-03-05 2024-11-21 9.8 10.0 Likely
CVE-2019-10594 2020-03-05 2024-11-21 9.8 10.0 Likely
CVE-2019-14000 2020-03-05 2024-11-21 7.8 7.2 Unknown
CVE-2019-14071 2020-03-05 2024-11-21 7.8 6.9 Unknown
CVE-2019-14095 2020-03-05 2024-11-21 9.8 10.0 Likely
CVE-2019-2317 2020-03-05 2024-11-21 9.8 5.0 Likely
CVE-2019-10551 2020-04-16 2024-11-21 9.1 9.4 Likely
CVE-2019-10574 2020-04-16 2024-11-21 7.1 3.6 Unknown
CVE-2019-10588 2020-04-16 2024-11-21 9.8 10.0 Likely
CVE-2019-10609 2020-04-16 2024-11-21 9.8 10.0 Likely
CVE-2019-10610 2020-04-16 2024-11-21 9.1 9.4 Likely
CVE-2019-14011 2020-04-16 2024-11-21 9.1 9.4 Likely
CVE-2019-14012 2020-04-16 2024-11-21 7.5 7.8 Likely
CVE-2019-14018 2020-04-16 2024-11-21 7.8 7.2 Unknown
CVE-2019-14019 2020-04-16 2024-11-21 9.1 9.4 Likely
CVE-2019-14020 2020-04-16 2024-11-21 9.1 9.4 Likely
CVE-2019-14021 2020-04-16 2024-11-21 7.8 7.2 Unknown
CVE-2019-14022 2020-04-16 2024-11-21 7.5 7.8 Likely
CVE-2019-14033 2020-04-16 2024-11-21 9.1 9.4 Likely
CVE-2020-3651 2020-04-16 2024-11-21 7.5 7.8 Likely
CVE-2019-14067 2020-06-02 2024-11-21 5.5 2.1 Unknown
CVE-2020-3630 2020-06-02 2024-11-21 7.8 4.6 Unknown
CVE-2020-3641 2020-06-02 2024-11-21 9.8 10.0 Likely
CVE-2019-14062 2020-06-22 2024-11-21 9.8 10.0 Likely
CVE-2019-14073 2020-06-22 2024-11-21 9.8 7.5 Likely
CVE-2019-14080 2020-06-22 2024-11-21 9.8 7.5 Likely
CVE-2019-14094 2020-06-22 2024-11-21 7.8 4.6 Unknown
CVE-2020-3614 2020-06-22 2024-11-21 9.8 7.5 Likely
CVE-2020-3635 2020-06-22 2024-11-21 7.8 4.6 Unknown
CVE-2020-3676 2020-06-22 2024-11-21 7.8 4.6 Unknown
CVE-2019-10580 2020-07-30 2024-11-21 7.8 4.6 Unknown
CVE-2019-14093 2020-07-30 2024-11-21 7.8 4.6 Unknown
CVE-2019-14099 2020-07-30 2024-11-21 7.8 4.6 Unknown
CVE-2019-14101 2020-07-30 2024-11-21 7.1 3.6 Unknown
CVE-2020-3671 2020-07-30 2024-11-21 9.8 7.5 Likely
CVE-2020-3688 2020-07-30 2024-11-21 9.8 7.5 Likely
CVE-2020-3698 2020-07-30 2024-11-21 9.8 7.5 Likely
CVE-2020-3699 2020-07-30 2024-11-21 9.8 7.5 Likely
CVE-2019-10527 2020-09-08 2024-11-21 7.8 7.2 Unknown
CVE-2019-10615 2020-09-08 2024-11-21 7.8 7.2 Unknown
CVE-2019-13994 2020-09-08 2024-11-21 7.8 7.2 Unknown
CVE-2019-13995 2020-09-08 2024-11-21 7.8 7.2 Unknown
CVE-2019-13998 2020-09-08 2024-11-21 7.8 7.2 Unknown
CVE-2019-13999 2020-09-08 2024-11-21 7.8 7.2 Unknown
CVE-2019-14052 2020-09-08 2024-11-21 9.8 10.0 Likely
CVE-2019-14074 2020-09-08 2024-11-21 7.8 7.2 Unknown
CVE-2019-14115 2020-09-08 2024-11-21 5.5 2.1 Unknown
CVE-2020-11115 2020-09-08 2024-11-21 7.5 5.0 Likely
CVE-2020-11116 2020-09-08 2024-11-21 9.8 10.0 Likely
CVE-2020-11118 2020-09-08 2024-11-21 7.5 5.0 Likely
CVE-2020-11120 2020-09-08 2024-11-21 7.8 4.6 Unknown
CVE-2020-11128 2020-09-08 2024-11-21 7.8 7.2 Unknown
CVE-2020-3620 2020-09-08 2024-11-21 5.5 2.1 Unknown
CVE-2020-3621 2020-09-08 2024-11-21 5.5 4.9 Unknown
CVE-2020-3622 2020-09-08 2024-11-21 7.8 4.6 Unknown
CVE-2020-3624 2020-09-08 2024-11-21 7.8 4.6 Unknown
CVE-2020-3643 2020-09-08 2024-11-21 5.5 2.1 Unknown
CVE-2020-3646 2020-09-08 2024-11-21 7.8 4.6 Unknown
CVE-2020-11135 2020-09-09 2024-11-21 7.5 7.8 Likely
CVE-2020-3634 2020-09-09 2024-11-21 9.1 9.4 Likely
CVE-2020-3656 2020-09-09 2024-11-21 7.8 7.2 Unknown
CVE-2020-11125 2020-11-02 2024-11-21 7.8 4.6 Unknown
CVE-2020-11157 2020-11-02 2024-11-21 7.5 5.0 Likely
CVE-2020-11162 2020-11-02 2024-11-21 7.8 4.6 Unknown
CVE-2020-11164 2020-11-02 2024-11-21 7.8 4.6 Unknown
CVE-2020-11174 2020-11-02 2024-11-21 7.8 4.6 Unknown
CVE-2020-3654 2020-11-02 2024-11-21 9.8 10.0 Likely
CVE-2020-3670 2020-11-02 2024-11-21 9.1 6.4 Likely
CVE-2020-3673 2020-11-02 2024-11-21 9.8 10.0 Likely
CVE-2020-3693 2020-11-02 2024-11-21 7.8 4.6 Unknown
CVE-2020-3696 2020-11-02 2024-11-21 7.8 4.6 Unknown
CVE-2020-3703 2020-11-02 2024-11-21 9.8 7.5 Likely
CVE-2023-28547 2024-04-01 2025-08-11 8.4 - -
CVE-2023-33023 2024-04-01 2025-08-11 8.4 - -
CVE-2024-21461 2024-07-01 2024-11-21 8.4 - -
CVE-2024-23368 2024-07-01 2024-11-21 7.8 - -
CVE-2024-23373 2024-07-01 2024-11-21 8.4 - -
CVE-2024-23353 2024-08-05 2024-11-26 7.5 - -
CVE-2024-23357 2024-08-05 2024-11-25 6.2 - -
CVE-2024-33042 2024-09-02 2025-08-11 7.8 - -
CVE-2024-33043 2024-09-02 2024-12-20 5.5 - -
CVE-2024-33052 2024-09-02 2025-08-11 7.8 - -
CVE-2024-33060 2024-09-02 2025-08-11 8.4 - -
CVE-2024-38415 2024-11-04 2024-11-07 7.8 - -
CVE-2024-38422 2024-11-04 2024-11-07 7.8 - -
CVE-2024-38423 2024-11-04 2024-11-07 7.8 - -
CVE-2024-43052 2024-12-02 2024-12-12 7.8 - -
CVE-2024-38426 2025-03-03 2025-08-11 5.4 - -
CVE-2024-53014 2025-03-03 2025-08-11 7.8 - -
CVE-2025-21424 2025-03-03 2025-08-11 7.8 - -
CVE-2025-21428 2025-04-07 2025-10-06 7.5 - -
CVE-2025-21453 2025-05-06 2025-08-11 7.8 - -
CVE-2024-53020 2025-06-03 2025-11-28 8.2 - -
CVE-2024-53021 2025-06-03 2025-11-28 8.2 - -
CVE-2024-53026 2025-06-03 2025-11-28 8.2 - -
CVE-2025-21433 2025-07-08 2025-08-11 6.2 - -
CVE-2025-27042 2025-07-08 2025-09-25 7.8 - -
CVE-2025-27061 2025-07-08 2025-08-11 7.8 - -
CVE-2025-21483 2025-09-24 2025-11-28 9.8 - -
CVE-2025-21487 2025-09-24 2025-11-28 8.2 - -
CVE-2025-27053 2025-10-09 2025-11-05 7.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for qualcomm qcm2150_firmware by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.