Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
sd_429_firmware Vendor: qualcomm

About This Product

sd_429_firmware is a software product offered by qualcomm. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 121 known vulnerabilities affecting qualcomm sd_429_firmware. This includes 42 critical-severity issues and 58 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2019 to 2024, indicating a recent active security attention. 21 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2017-11004 2019-01-03 2024-11-21 5.5 2.1 Unknown
CVE-2017-18141 2019-01-03 2024-11-21 7.8 7.2 Unknown
CVE-2017-18320 2019-01-03 2024-11-21 7.8 7.2 Unknown
CVE-2017-18330 2019-01-03 2024-11-21 7.8 7.2 Unknown
CVE-2017-8276 2019-01-18 2024-11-21 7.8 4.6 Unknown
CVE-2018-11279 2019-01-18 2024-11-21 8.8 8.3 Unknown
CVE-2018-5867 2019-01-18 2024-11-21 7.8 7.2 Unknown
CVE-2018-11847 2019-02-11 2024-11-21 7.8 7.2 Unknown
CVE-2018-11888 2019-02-11 2024-11-21 7.8 7.2 Unknown
CVE-2018-11899 2019-02-11 2024-11-21 7.8 4.6 Unknown
CVE-2018-13888 2019-02-11 2024-11-21 7.8 7.2 Unknown
CVE-2018-11289 2019-02-25 2024-11-21 7.8 7.2 Unknown
CVE-2018-11820 2019-02-25 2024-11-21 5.5 4.9 Unknown
CVE-2018-11845 2019-02-25 2024-11-21 5.5 4.9 Unknown
CVE-2018-11864 2019-02-25 2024-11-21 5.5 4.9 Unknown
CVE-2018-11931 2019-02-25 2024-11-21 7.8 7.2 Unknown
CVE-2018-11938 2019-02-25 2024-11-21 7.8 4.6 Unknown
CVE-2018-11945 2019-02-25 2024-11-21 9.8 7.5 Likely
CVE-2018-11948 2019-02-25 2024-11-21 5.5 4.9 Unknown
CVE-2018-13900 2019-02-25 2024-11-21 7.8 7.2 Unknown
CVE-2018-13905 2019-02-25 2024-11-21 7.8 7.2 Unknown
CVE-2018-13912 2019-02-25 2024-11-21 5.5 2.1 Unknown
CVE-2018-13913 2019-02-25 2024-11-21 7.8 4.6 Unknown
CVE-2018-11958 2019-04-04 2024-11-21 5.5 4.9 Unknown
CVE-2018-11966 2019-04-04 2024-11-21 7.8 7.2 Unknown
CVE-2018-13918 2019-04-04 2024-11-21 7.8 7.2 Unknown
CVE-2018-11271 2019-05-24 2024-11-21 9.8 7.5 Likely
CVE-2018-11930 2019-05-24 2024-11-21 9.8 10.0 Likely
CVE-2018-11953 2019-05-24 2024-11-21 9.8 10.0 Likely
CVE-2018-11967 2019-05-24 2024-11-21 7.8 7.2 Unknown
CVE-2018-11976 2019-05-24 2024-11-21 5.5 4.9 Unknown
CVE-2018-12005 2019-05-24 2024-11-21 5.5 4.9 Unknown
CVE-2018-13885 2019-05-24 2024-11-21 5.5 4.9 Unknown
CVE-2018-13886 2019-05-24 2024-11-21 9.8 10.0 Likely
CVE-2018-13887 2019-05-24 2024-11-21 9.8 10.0 Likely
CVE-2018-13895 2019-05-24 2024-11-21 7.8 7.2 Unknown
CVE-2018-13899 2019-05-24 2024-11-21 7.8 7.2 Unknown
CVE-2018-13920 2019-05-24 2024-11-21 7.8 7.2 Unknown
CVE-2018-13925 2019-05-24 2024-11-21 9.8 10.0 Likely
CVE-2019-2244 2019-05-24 2024-11-21 9.8 10.0 Likely
CVE-2019-2245 2019-05-24 2024-11-21 9.8 10.0 Likely
CVE-2019-2247 2019-05-24 2024-11-21 7.8 4.6 Unknown
CVE-2019-2248 2019-05-24 2024-11-21 7.8 4.6 Unknown
CVE-2017-8252 2019-06-14 2024-11-21 5.5 4.9 Unknown
CVE-2018-11955 2019-06-14 2024-11-21 9.8 7.5 Likely
CVE-2018-13898 2019-06-14 2024-11-21 9.8 7.5 Likely
CVE-2018-13902 2019-06-14 2024-11-21 7.5 5.0 Likely
CVE-2018-13906 2019-06-14 2024-11-21 9.1 6.4 Likely
CVE-2018-13907 2019-06-14 2024-11-21 5.3 5.0 Likely
CVE-2018-13908 2019-06-14 2024-11-21 7.8 4.6 Unknown
CVE-2018-13909 2019-06-14 2024-11-21 7.0 6.9 Unknown
CVE-2018-13910 2019-06-14 2024-11-21 7.8 7.2 Unknown
CVE-2018-13911 2019-06-14 2024-11-21 9.8 10.0 Likely
CVE-2018-5913 2019-06-14 2024-11-21 7.8 7.2 Unknown
CVE-2019-2255 2019-06-14 2024-11-21 9.8 10.0 Likely
CVE-2019-2256 2019-06-14 2024-11-21 9.8 10.0 Likely
CVE-2019-2259 2019-06-14 2024-11-21 9.8 10.0 Likely
CVE-2018-13896 2019-07-22 2024-11-21 7.8 7.2 Unknown
CVE-2018-13924 2019-07-22 2024-11-21 9.8 10.0 Likely
CVE-2019-2243 2019-07-22 2024-11-21 5.5 2.1 Unknown
CVE-2019-2260 2019-07-22 2024-11-21 7.0 6.9 Unknown
CVE-2019-2261 2019-07-22 2024-11-21 5.5 4.9 Unknown
CVE-2019-2264 2019-07-22 2024-11-21 7.8 4.6 Unknown
CVE-2019-2279 2019-07-22 2024-11-21 9.8 7.5 Likely
CVE-2019-2287 2019-07-22 2024-11-21 9.8 7.5 Likely
CVE-2019-2235 2019-07-25 2024-11-21 7.8 4.6 Unknown
CVE-2019-2236 2019-07-25 2024-11-21 5.5 2.1 Unknown
CVE-2019-2239 2019-07-25 2024-11-21 5.5 2.1 Unknown
CVE-2019-2253 2019-07-25 2024-11-21 9.8 7.5 Likely
CVE-2019-2254 2019-07-25 2024-11-21 9.8 7.5 Likely
CVE-2019-2273 2019-07-25 2024-11-21 7.5 7.8 Likely
CVE-2019-2301 2019-07-25 2024-11-21 7.8 4.6 Unknown
CVE-2019-2308 2019-07-25 2024-11-21 7.8 7.2 Unknown
CVE-2019-2314 2019-07-25 2024-11-21 7.0 4.4 Unknown
CVE-2019-2322 2019-07-25 2024-11-21 9.8 9.3 Likely
CVE-2019-2326 2019-07-25 2024-11-21 7.8 7.2 Unknown
CVE-2019-2327 2019-07-25 2024-11-21 9.8 10.0 Likely
CVE-2019-2328 2019-07-25 2024-11-21 7.8 7.2 Unknown
CVE-2019-2330 2019-07-25 2024-11-21 5.5 4.9 Unknown
CVE-2019-2334 2019-07-25 2024-11-21 7.5 7.8 Likely
CVE-2019-2343 2019-07-25 2024-11-21 5.5 2.1 Unknown
CVE-2019-10489 2019-09-30 2024-11-21 7.5 7.8 Likely
CVE-2019-10492 2019-09-30 2024-11-21 7.8 7.2 Unknown
CVE-2019-10497 2019-09-30 2024-11-21 7.8 4.6 Unknown
CVE-2019-10498 2019-09-30 2024-11-21 7.8 4.6 Unknown
CVE-2019-10501 2019-09-30 2024-11-21 7.8 4.6 Unknown
CVE-2019-10509 2019-09-30 2024-11-21 9.8 10.0 Likely
CVE-2019-10538 2019-09-30 2024-11-21 9.8 10.0 Likely
CVE-2019-10539 2019-09-30 2024-11-21 9.8 10.0 Likely
CVE-2019-2252 2019-09-30 2024-11-21 9.8 10.0 Likely
CVE-2019-2284 2019-09-30 2024-11-21 7.0 4.4 Unknown
CVE-2019-2294 2019-09-30 2024-11-21 9.8 10.0 Likely
CVE-2019-2333 2019-09-30 2024-11-21 7.8 4.6 Unknown
CVE-2019-2341 2019-09-30 2024-11-21 7.8 4.6 Unknown
CVE-2019-10488 2019-11-06 2024-11-21 7.5 5.0 Likely
CVE-2019-10491 2019-11-06 2024-11-21 7.8 4.6 Unknown
CVE-2019-10495 2019-11-06 2024-11-21 7.3 4.6 Unknown
CVE-2019-10496 2019-11-06 2024-11-21 7.8 4.6 Unknown
CVE-2019-10502 2019-11-06 2024-11-21 7.8 4.6 Unknown
CVE-2019-10504 2019-11-06 2024-11-21 6.5 5.0 Likely
CVE-2019-10505 2019-11-06 2024-11-21 9.8 7.5 Likely
CVE-2019-10512 2019-11-06 2024-11-21 7.8 4.6 Unknown
CVE-2019-10515 2019-11-06 2024-11-21 5.5 4.9 Unknown
CVE-2019-10522 2019-11-06 2024-11-21 9.8 7.5 Likely
CVE-2019-10524 2019-11-06 2024-11-21 7.8 4.6 Unknown
CVE-2019-10529 2019-11-06 2024-11-21 8.1 9.3 Likely
CVE-2019-10531 2019-11-06 2024-11-21 9.8 10.0 Likely
CVE-2019-10533 2019-11-06 2024-11-21 9.8 10.0 Likely
CVE-2019-10534 2019-11-06 2024-11-21 9.8 10.0 Likely
CVE-2019-10541 2019-11-06 2024-11-21 9.8 10.0 Likely
CVE-2019-2246 2019-11-06 2024-11-21 7.8 7.2 Unknown
CVE-2019-2258 2019-11-06 2024-11-21 9.8 10.0 Likely
CVE-2019-2275 2019-11-06 2024-11-21 5.5 2.1 Unknown
CVE-2019-2283 2019-11-06 2024-11-21 9.8 10.0 Likely
CVE-2019-2285 2019-11-06 2024-11-21 9.8 10.0 Likely
CVE-2019-2323 2019-11-06 2024-11-21 9.8 10.0 Likely
CVE-2019-2325 2019-11-06 2024-11-21 9.8 10.0 Likely
CVE-2019-2331 2019-11-06 2024-11-21 9.8 10.0 Likely
CVE-2019-2332 2019-11-06 2024-11-21 9.8 10.0 Likely
CVE-2019-10530 2019-12-12 2024-11-21 7.8 4.6 Unknown
CVE-2018-11922 2024-11-26 2025-01-09 9.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for qualcomm sd_429_firmware by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.