Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
sc8380xp Vendor: qualcomm

About This Product

sc8380xp is a software product offered by qualcomm. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 188 known vulnerabilities affecting qualcomm sc8380xp. This includes 5 critical-severity issues and 162 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2023 to 2026, indicating a recent active security attention. 21 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2023-24852 2023-11-07 2025-08-11 8.4 - -
CVE-2023-28545 2023-11-07 2025-08-11 8.2 - -
CVE-2023-28556 2023-11-07 2025-08-11 7.1 - -
CVE-2023-28574 2023-11-07 2024-11-21 9.0 - -
CVE-2023-33045 2023-11-07 2024-11-21 9.8 - -
CVE-2023-33047 2023-11-07 2025-08-11 7.5 - -
CVE-2023-33048 2023-11-07 2024-11-21 7.5 - -
CVE-2023-33056 2023-11-07 2024-11-21 7.5 - -
CVE-2023-33061 2023-11-07 2024-11-21 7.5 - -
CVE-2023-28546 2023-12-05 2025-08-11 7.8 - -
CVE-2023-28550 2023-12-05 2025-08-11 7.8 - -
CVE-2023-28585 2023-12-05 2025-08-11 8.2 - -
CVE-2023-28586 2023-12-05 2025-08-11 6.0 - -
CVE-2023-28587 2023-12-05 2025-08-11 7.8 - -
CVE-2023-33017 2023-12-05 2025-08-11 7.8 - -
CVE-2023-33022 2023-12-05 2025-08-11 8.4 - -
CVE-2023-33041 2023-12-05 2024-11-21 7.5 - -
CVE-2023-33081 2023-12-05 2024-11-21 7.5 - -
CVE-2023-33088 2023-12-05 2025-08-11 8.4 - -
CVE-2023-33089 2023-12-05 2025-08-11 7.5 - -
CVE-2023-33097 2023-12-05 2024-11-21 7.5 - -
CVE-2023-33098 2023-12-05 2025-08-11 7.5 - -
CVE-2023-33072 2024-02-06 2025-08-11 9.3 - -
CVE-2023-33076 2024-02-06 2024-11-21 5.9 - -
CVE-2023-43522 2024-02-06 2025-08-11 7.5 - -
CVE-2023-43523 2024-02-06 2024-11-21 7.5 - -
CVE-2023-43532 2024-02-06 2024-11-21 8.4 - -
CVE-2023-43533 2024-02-06 2025-08-11 7.5 - -
CVE-2023-43535 2024-02-06 2024-11-21 8.4 - -
CVE-2023-43536 2024-02-06 2025-08-11 7.5 - -
CVE-2023-28578 2024-03-04 2025-08-11 9.3 - -
CVE-2023-33078 2024-03-04 2025-01-10 5.1 - -
CVE-2023-33105 2024-03-04 2025-01-10 7.5 - -
CVE-2023-43539 2024-03-04 2025-01-10 7.5 - -
CVE-2023-43540 2024-03-04 2025-01-10 8.4 - -
CVE-2023-43541 2024-03-04 2025-01-10 8.4 - -
CVE-2023-43549 2024-03-04 2025-01-10 8.4 - -
CVE-2023-28547 2024-04-01 2025-08-11 8.4 - -
CVE-2023-33023 2024-04-01 2025-08-11 8.4 - -
CVE-2023-33115 2024-04-01 2025-08-11 7.8 - -
CVE-2024-21470 2024-04-01 2025-01-13 8.4 - -
CVE-2023-33119 2024-05-06 2025-08-11 8.4 - -
CVE-2023-43530 2024-05-06 2025-08-11 5.9 - -
CVE-2023-43531 2024-05-06 2025-08-11 8.4 - -
CVE-2024-21474 2024-05-06 2025-01-15 8.4 - -
CVE-2024-21476 2024-05-06 2025-01-15 7.8 - -
CVE-2024-21477 2024-05-06 2025-01-15 7.5 - -
CVE-2023-43538 2024-06-03 2025-01-27 9.3 - -
CVE-2023-43542 2024-06-03 2025-08-11 7.8 - -
CVE-2024-23360 2024-06-03 2025-01-09 8.4 - -
CVE-2024-23363 2024-06-03 2025-01-09 7.5 - -
CVE-2023-43554 2024-07-01 2025-08-11 8.4 - -
CVE-2024-21461 2024-07-01 2024-11-21 8.4 - -
CVE-2024-21462 2024-07-01 2024-11-21 7.1 - -
CVE-2024-21465 2024-07-01 2024-11-21 7.8 - -
CVE-2024-21469 2024-07-01 2024-11-21 7.3 - -
CVE-2024-21481 2024-08-05 2025-08-11 8.4 - -
CVE-2024-23355 2024-08-05 2024-11-26 7.8 - -
CVE-2024-23356 2024-08-05 2024-11-26 7.8 - -
CVE-2024-23357 2024-08-05 2024-11-25 6.2 - -
CVE-2024-33013 2024-08-05 2024-11-26 7.5 - -
CVE-2024-23362 2024-09-02 2025-10-03 7.1 - -
CVE-2024-23364 2024-09-02 2025-10-03 7.5 - -
CVE-2024-33016 2024-09-02 2025-10-03 6.8 - -
CVE-2024-33047 2024-09-02 2025-08-11 8.4 - -
CVE-2024-33051 2024-09-02 2025-08-11 7.5 - -
CVE-2024-23369 2024-10-07 2025-08-11 7.8 - -
CVE-2024-33065 2024-10-07 2025-12-31 8.4 - -
CVE-2024-38403 2024-11-04 2024-11-07 7.5 - -
CVE-2024-38406 2024-11-04 2024-11-07 7.8 - -
CVE-2024-38407 2024-11-04 2024-11-07 7.8 - -
CVE-2024-38408 2024-11-04 2024-11-08 8.2 - -
CVE-2024-38409 2024-11-04 2024-11-07 7.8 - -
CVE-2024-38410 2024-11-04 2024-11-07 7.8 - -
CVE-2024-33044 2024-12-02 2024-12-12 8.4 - -
CVE-2024-33056 2024-12-02 2024-12-12 8.4 - -
CVE-2024-43049 2024-12-02 2024-12-12 7.8 - -
CVE-2024-43050 2024-12-02 2024-12-12 7.8 - -
CVE-2024-43052 2024-12-02 2024-12-12 7.8 - -
CVE-2024-43053 2024-12-02 2024-12-12 7.8 - -
CVE-2024-45541 2025-01-06 2025-08-11 7.8 - -
CVE-2024-45542 2025-01-06 2025-08-11 7.8 - -
CVE-2024-45546 2025-01-06 2025-01-13 7.8 - -
CVE-2024-45547 2025-01-06 2025-01-13 7.8 - -
CVE-2024-45548 2025-01-06 2025-01-13 7.8 - -
CVE-2024-45550 2025-01-06 2025-01-13 7.8 - -
CVE-2024-38420 2025-02-03 2025-02-05 8.8 - -
CVE-2024-45560 2025-02-03 2025-02-05 7.8 - -
CVE-2024-45561 2025-02-03 2025-02-05 7.8 - -
CVE-2024-45573 2025-02-03 2025-02-05 7.8 - -
CVE-2024-49838 2025-02-03 2025-02-05 8.2 - -
CVE-2024-49840 2025-02-03 2025-02-05 7.8 - -
CVE-2024-43051 2025-03-03 2025-08-11 5.5 - -
CVE-2024-43056 2025-03-03 2025-08-11 5.5 - -
CVE-2024-53011 2025-03-03 2025-08-11 7.9 - -
CVE-2024-53033 2025-03-03 2025-03-07 7.8 - -
CVE-2024-53034 2025-03-03 2025-03-07 7.8 - -
CVE-2024-33058 2025-04-07 2025-10-03 7.5 - -
CVE-2024-43046 2025-04-07 2025-10-06 5.5 - -
CVE-2024-43065 2025-04-07 2025-10-06 7.1 - -
CVE-2024-45549 2025-04-07 2025-10-06 7.7 - -
CVE-2024-45551 2025-04-07 2025-10-06 6.2 - -
CVE-2024-45557 2025-04-07 2025-08-19 7.8 - -
CVE-2025-21421 2025-04-07 2025-08-19 7.8 - -
CVE-2025-21423 2025-04-07 2025-08-19 7.8 - -
CVE-2025-21438 2025-04-07 2025-10-03 7.8 - -
CVE-2025-21440 2025-04-07 2025-08-20 7.8 - -
CVE-2025-21441 2025-04-07 2025-08-20 7.8 - -
CVE-2025-21447 2025-04-07 2025-08-20 7.8 - -
CVE-2025-21448 2025-04-07 2025-10-06 7.5 - -
CVE-2024-49835 2025-05-06 2025-05-09 7.8 - -
CVE-2024-49841 2025-05-06 2025-12-19 7.8 - -
CVE-2024-49842 2025-05-06 2025-08-11 7.8 - -
CVE-2024-49844 2025-05-06 2025-08-11 7.8 - -
CVE-2024-49845 2025-05-06 2025-05-09 7.8 - -
CVE-2025-21462 2025-05-06 2025-05-09 7.8 - -
CVE-2025-21469 2025-05-06 2025-08-11 7.8 - -
CVE-2025-21470 2025-05-06 2025-08-11 7.8 - -
CVE-2025-21475 2025-05-06 2025-08-11 7.8 - -
CVE-2024-53010 2025-06-03 2025-11-28 7.8 - -
CVE-2025-21463 2025-06-03 2025-11-28 7.5 - -
CVE-2025-21480 2025-06-03 2025-10-28 8.6 - -
CVE-2025-27031 2025-06-03 2025-08-20 7.8 - -
CVE-2024-53009 2025-07-08 2025-08-11 5.3 - -
CVE-2025-21422 2025-07-08 2025-08-11 7.1 - -
CVE-2025-21432 2025-07-08 2025-08-11 7.8 - -
CVE-2025-21433 2025-07-08 2025-08-11 6.2 - -
CVE-2025-21446 2025-07-08 2025-08-11 7.5 - -
CVE-2025-21449 2025-07-08 2026-02-10 7.5 - -
CVE-2025-21454 2025-07-08 2025-08-11 7.5 - -
CVE-2025-21466 2025-07-08 2025-08-11 7.8 - -
CVE-2025-27044 2025-07-08 2025-07-21 7.8 - -
CVE-2025-27046 2025-07-08 2025-08-11 7.8 - -
CVE-2025-27047 2025-07-08 2025-08-11 7.8 - -
CVE-2025-27050 2025-07-08 2025-08-11 7.8 - -
CVE-2025-27051 2025-07-08 2025-07-21 7.8 - -
CVE-2025-27055 2025-07-08 2025-08-11 7.8 - -
CVE-2025-27057 2025-07-08 2025-09-25 7.5 - -
CVE-2025-27058 2025-07-08 2025-07-21 7.8 - -
CVE-2025-21464 2025-08-06 2025-11-28 6.5 - -
CVE-2025-21465 2025-08-06 2025-11-28 6.5 - -
CVE-2025-27065 2025-08-06 2025-08-20 7.5 - -
CVE-2025-27066 2025-08-06 2025-11-28 7.5 - -
CVE-2025-27067 2025-08-06 2025-08-18 7.8 - -
CVE-2025-27068 2025-08-06 2025-08-18 7.8 - -
CVE-2025-27069 2025-08-06 2025-08-18 7.8 - -
CVE-2025-27073 2025-08-06 2025-08-20 7.5 - -
CVE-2025-27075 2025-08-06 2025-08-18 7.8 - -
CVE-2025-27076 2025-08-06 2025-08-19 7.8 - -
CVE-2025-21481 2025-09-24 2025-09-25 7.8 - -
CVE-2025-21482 2025-09-24 2025-12-02 7.1 - -
CVE-2025-27032 2025-09-24 2025-11-28 7.8 - -
CVE-2025-27036 2025-09-24 2025-09-25 6.1 - -
CVE-2025-47316 2025-09-24 2025-09-25 7.8 - -
CVE-2025-47327 2025-09-24 2025-09-25 7.8 - -
CVE-2025-27045 2025-10-09 2025-11-05 6.1 - -
CVE-2025-27048 2025-10-09 2025-11-05 7.8 - -
CVE-2025-27049 2025-10-09 2025-11-05 5.5 - -
CVE-2025-27053 2025-10-09 2025-11-05 7.8 - -
CVE-2025-27054 2025-10-09 2025-11-05 7.8 - -
CVE-2025-47338 2025-10-09 2025-11-05 7.8 - -
CVE-2025-47340 2025-10-09 2025-11-05 7.8 - -
CVE-2025-47341 2025-10-09 2025-11-05 7.8 - -
CVE-2025-47349 2025-10-09 2025-11-05 7.8 - -
CVE-2025-47355 2025-10-09 2025-11-05 7.8 - -
CVE-2025-27070 2025-11-04 2025-11-05 7.8 - -
CVE-2025-47367 2025-11-04 2025-11-05 7.8 - -
CVE-2025-47368 2025-11-04 2025-11-05 7.8 - -
CVE-2025-47370 2025-11-04 2025-11-05 6.5 - -
CVE-2025-47319 2025-12-18 2026-01-28 6.7 - -
CVE-2025-47323 2025-12-18 2026-01-28 7.8 - -
CVE-2025-47350 2025-12-18 2025-12-23 7.8 - -
CVE-2025-47387 2025-12-18 2026-01-28 7.8 - -
CVE-2025-47330 2026-01-07 2026-01-28 5.5 - -
CVE-2025-47331 2026-01-07 2026-01-28 6.1 - -
CVE-2025-47339 2026-01-07 2026-01-27 7.8 - -
CVE-2025-47343 2026-01-07 2026-01-12 7.8 - -
CVE-2025-47345 2026-01-07 2026-01-27 8.4 - -
CVE-2025-47346 2026-01-07 2026-01-27 7.8 - -
CVE-2025-47348 2026-01-07 2026-01-28 7.8 - -
CVE-2025-47356 2026-01-07 2026-01-27 7.8 - -
CVE-2025-47358 2026-02-02 2026-02-11 7.8 - -
CVE-2025-47359 2026-02-02 2026-02-11 7.8 - -
CVE-2025-47366 2026-02-02 2026-02-11 7.1 - -
CVE-2025-47373 2026-03-02 2026-03-04 7.8 - -
CVE-2025-59600 2026-03-02 2026-03-03 7.8 - -
CVE-2025-59603 2026-03-02 2026-03-04 7.8 - -
CVE-2026-21385 2026-03-02 2026-03-04 7.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for qualcomm sc8380xp by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.