Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
sd_400_firmware Vendor: qualcomm

About This Product

sd_400_firmware is a software product offered by qualcomm. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 164 known vulnerabilities affecting qualcomm sd_400_firmware. This includes 123 critical-severity issues and 39 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2018 to 2018, indicating a recent active security attention. 2 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2017-17773 2018-03-15 2024-11-21 9.8 10.0 Likely
CVE-2017-14912 2018-03-30 2024-11-21 9.8 10.0 Likely
CVE-2017-18074 2018-04-11 2024-11-21 9.8 10.0 Likely
CVE-2017-18130 2018-04-11 2024-11-21 9.8 10.0 Likely
CVE-2017-18136 2018-04-11 2024-11-21 9.8 10.0 Likely
CVE-2017-18138 2018-04-11 2024-11-21 9.8 10.0 Likely
CVE-2017-18139 2018-04-11 2024-11-21 9.8 10.0 Likely
CVE-2017-18140 2018-04-11 2024-11-21 9.8 10.0 Likely
CVE-2017-18146 2018-04-11 2024-11-21 9.8 10.0 Likely
CVE-2017-8275 2018-04-11 2024-11-21 9.8 10.0 Likely
CVE-2018-3593 2018-04-11 2024-11-21 9.8 10.0 Likely
CVE-2014-10039 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2014-10043 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2014-10044 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2014-10045 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2014-10046 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2014-10047 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2014-10048 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2014-10051 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2014-10052 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2014-10053 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2014-10054 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2014-10055 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2014-10057 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2014-10058 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2014-10059 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2014-10062 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2014-9985 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2014-9986 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2014-9989 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2014-9991 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2014-9993 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2014-9994 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2014-9995 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2014-9996 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2014-9997 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9112 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9118 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9119 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2015-9120 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9122 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9123 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2015-9124 2018-04-18 2024-11-21 9.1 8.5 Likely
CVE-2015-9127 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9128 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9130 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9131 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2015-9132 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2015-9133 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9135 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9137 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2015-9138 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9139 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9140 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2015-9141 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9142 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9143 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9144 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9146 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9147 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9148 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9149 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9150 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9151 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9152 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9156 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9157 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9158 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9159 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9160 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9161 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9163 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2015-9164 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9165 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9166 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2015-9169 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2015-9170 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9172 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9175 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9176 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2015-9177 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9181 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9182 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9184 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9186 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9189 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2015-9190 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9191 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9192 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9193 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2015-9194 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2015-9195 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9196 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9197 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9198 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9199 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9201 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9203 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9206 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9207 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9208 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9209 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9210 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9211 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9212 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9213 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2015-9216 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9217 2018-04-18 2024-11-21 7.8 7.2 Unknown
CVE-2015-9218 2018-04-18 2024-11-21 5.5 4.9 Unknown
CVE-2015-9219 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9221 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9222 2018-04-18 2024-11-21 7.5 7.8 Likely
CVE-2015-9223 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2015-9224 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10407 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10410 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10411 2018-04-18 2024-11-21 7.5 7.8 Likely
CVE-2016-10412 2018-04-18 2024-11-21 9.8 7.5 Likely
CVE-2016-10414 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10415 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2016-10416 2018-04-18 2024-11-21 7.5 7.8 Likely
CVE-2016-10417 2018-04-18 2024-11-21 8.1 9.3 Likely
CVE-2016-10420 2018-04-18 2024-11-21 5.5 7.1 Likely
CVE-2016-10421 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10422 2018-04-18 2024-11-21 9.8 7.5 Likely
CVE-2016-10425 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10427 2018-04-18 2024-11-21 7.5 7.8 Likely
CVE-2016-10429 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2016-10433 2018-04-18 2024-11-21 8.1 9.3 Likely
CVE-2016-10435 2018-04-18 2024-11-21 8.1 9.3 Likely
CVE-2016-10436 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10437 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2016-10438 2018-04-18 2024-11-21 7.5 5.0 Likely
CVE-2016-10441 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10448 2018-04-18 2024-11-21 9.8 7.5 Likely
CVE-2016-10449 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10450 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10451 2018-04-18 2024-11-21 7.8 7.2 Unknown
CVE-2016-10455 2018-04-18 2024-11-21 7.5 7.8 Likely
CVE-2016-10456 2018-04-18 2024-11-21 9.8 7.5 Likely
CVE-2016-10457 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10459 2018-04-18 2024-11-21 7.5 7.8 Likely
CVE-2016-10466 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10467 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10472 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10473 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10475 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10476 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10477 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10479 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10480 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10482 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10484 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10485 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10489 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10490 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10491 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10492 2018-04-18 2024-11-21 9.1 6.4 Likely
CVE-2016-10494 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10497 2018-04-18 2024-11-21 7.5 7.8 Likely
CVE-2016-10498 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2016-10499 2018-04-18 2024-11-21 7.5 7.8 Likely
CVE-2016-10501 2018-04-18 2024-11-21 9.8 10.0 Likely
CVE-2017-18172 2018-10-23 2024-11-21 7.8 7.2 Unknown

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for qualcomm sd_400_firmware by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.