Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
sdx20m_firmware Vendor: qualcomm

About This Product

sdx20m_firmware is a software product offered by qualcomm. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 95 known vulnerabilities affecting qualcomm sdx20m_firmware. This includes 16 critical-severity issues and 73 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2020 to 2025, indicating a recent active security attention. 6 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2020-11131 2020-11-12 2024-11-21 7.8 4.6 Unknown
CVE-2020-11168 2020-11-12 2024-11-21 9.8 10.0 Likely
CVE-2020-11193 2020-11-12 2024-11-21 9.8 10.0 Likely
CVE-2020-11196 2020-11-12 2024-11-21 9.8 10.0 Likely
CVE-2020-11119 2021-01-21 2024-11-21 7.5 5.0 Likely
CVE-2020-11204 2021-02-22 2024-11-21 7.8 7.2 Unknown
CVE-2020-11269 2021-02-22 2024-11-21 8.8 8.3 Unknown
CVE-2020-11272 2021-02-22 2024-11-21 9.8 10.0 Likely
CVE-2020-11275 2021-02-22 2024-11-21 9.1 9.4 Likely
CVE-2020-11276 2021-02-22 2024-11-21 9.1 9.4 Likely
CVE-2020-11296 2021-02-22 2024-11-21 7.5 5.0 Likely
CVE-2020-11299 2021-03-17 2024-11-21 9.8 10.0 Likely
CVE-2020-11309 2021-03-17 2024-11-21 7.8 7.2 Unknown
CVE-2020-11234 2021-04-07 2024-11-21 8.4 7.2 Unknown
CVE-2021-1905 2021-05-07 2025-10-28 8.4 7.2 Unknown
CVE-2021-1906 2021-05-07 2025-10-28 6.2 2.1 Unknown
CVE-2021-1910 2021-05-07 2024-11-21 7.3 10.0 Likely
CVE-2020-11159 2021-06-09 2024-11-21 9.1 9.4 Likely
CVE-2020-11161 2021-06-09 2024-11-21 7.1 3.6 Unknown
CVE-2020-11233 2021-06-09 2024-11-21 7.0 6.9 Unknown
CVE-2020-11235 2021-06-09 2024-11-21 7.8 7.2 Unknown
CVE-2020-11239 2021-06-09 2024-11-21 7.8 7.2 Unknown
CVE-2020-11241 2021-06-09 2024-11-21 7.5 7.8 Likely
CVE-2020-11261 2021-06-09 2025-10-28 7.8 7.2 Unknown
CVE-2020-11262 2021-06-09 2024-11-21 7.0 4.4 Unknown
CVE-2020-11267 2021-06-09 2024-11-21 8.4 4.6 Unknown
CVE-2021-1900 2021-06-09 2024-11-21 8.4 4.4 Unknown
CVE-2021-1955 2021-07-13 2024-11-21 7.5 5.0 Likely
CVE-2020-11264 2021-09-08 2024-11-21 9.1 10.0 Likely
CVE-2020-11301 2021-09-08 2024-11-21 9.1 5.0 Likely
CVE-2021-1904 2021-09-08 2024-11-21 6.2 2.1 Unknown
CVE-2021-1972 2021-09-08 2024-11-21 9.8 10.0 Likely
CVE-2021-1909 2021-09-09 2024-11-21 7.3 7.2 Unknown
CVE-2021-1976 2021-09-17 2024-11-21 9.8 10.0 Likely
CVE-2021-30260 2021-09-17 2024-11-21 8.4 4.6 Unknown
CVE-2020-11303 2021-10-20 2024-11-21 8.6 5.0 Likely
CVE-2021-1949 2021-10-20 2024-11-21 8.4 7.2 Unknown
CVE-2021-1977 2021-10-20 2024-11-21 7.5 6.4 Likely
CVE-2021-30288 2021-10-20 2024-11-21 8.4 7.2 Unknown
CVE-2021-30310 2021-10-20 2024-11-21 7.5 5.0 Likely
CVE-2021-1924 2021-11-12 2024-11-21 9.0 2.1 Unknown
CVE-2021-30284 2021-11-12 2024-11-21 7.5 6.4 Likely
CVE-2022-25687 2022-10-19 2025-05-09 7.3 - -
CVE-2022-25718 2022-10-19 2025-05-09 9.1 - -
CVE-2022-25720 2022-10-19 2025-05-09 9.8 - -
CVE-2022-25748 2022-10-19 2025-04-22 9.8 - -
CVE-2022-25749 2022-10-19 2025-04-22 7.5 - -
CVE-2022-25710 2022-11-15 2025-04-22 7.5 - -
CVE-2022-25724 2022-11-15 2025-04-22 8.4 - -
CVE-2022-25743 2022-11-15 2025-04-22 8.4 - -
CVE-2022-33237 2022-11-15 2025-04-22 7.5 - -
CVE-2022-33239 2022-11-15 2025-04-22 7.5 - -
CVE-2022-33235 2022-12-13 2025-04-22 8.2 - -
CVE-2022-33238 2022-12-13 2025-04-22 7.5 - -
CVE-2022-22079 2023-01-09 2025-04-09 4.6 - -
CVE-2022-33266 2023-01-09 2025-04-09 5.9 - -
CVE-2022-33285 2023-01-09 2025-04-09 7.5 - -
CVE-2022-33286 2023-01-09 2025-04-09 7.5 - -
CVE-2022-33290 2023-01-09 2025-04-09 7.5 - -
CVE-2022-33299 2023-01-09 2025-04-09 7.5 - -
CVE-2022-33271 2023-02-12 2024-11-21 8.2 - -
CVE-2022-33280 2023-02-12 2024-11-21 7.3 - -
CVE-2022-40512 2023-02-12 2024-11-21 7.5 - -
CVE-2022-22075 2023-03-10 2024-11-21 6.2 - -
CVE-2022-25655 2023-03-10 2024-11-21 8.4 - -
CVE-2022-40515 2023-03-10 2024-11-21 7.3 - -
CVE-2022-40531 2023-03-10 2024-11-21 8.4 - -
CVE-2022-40537 2023-03-10 2024-11-21 7.3 - -
CVE-2022-40503 2023-04-13 2024-11-21 8.2 - -
CVE-2022-40532 2023-04-13 2024-11-21 8.4 - -
CVE-2023-21665 2023-05-02 2024-11-21 8.4 - -
CVE-2023-21666 2023-05-02 2024-11-21 8.4 - -
CVE-2023-21628 2023-06-06 2024-11-21 8.4 - -
CVE-2023-28541 2023-07-04 2025-08-11 7.8 - -
CVE-2023-28542 2023-07-04 2025-08-11 7.8 - -
CVE-2023-28564 2023-09-05 2024-11-21 7.8 - -
CVE-2023-28565 2023-09-05 2024-11-21 7.8 - -
CVE-2023-33019 2023-09-05 2024-11-21 7.5 - -
CVE-2023-33020 2023-09-05 2024-11-21 7.5 - -
CVE-2023-33059 2023-11-07 2025-08-11 7.8 - -
CVE-2023-33080 2023-12-05 2025-08-11 7.5 - -
CVE-2023-33107 2023-12-05 2025-10-28 8.4 - -
CVE-2023-33120 2024-01-02 2025-08-11 7.8 - -
CVE-2023-43511 2024-01-02 2025-08-11 7.5 - -
CVE-2024-21468 2024-04-01 2025-08-11 8.4 - -
CVE-2024-21471 2024-05-06 2025-08-11 8.4 - -
CVE-2024-33016 2024-09-02 2025-10-03 6.8 - -
CVE-2024-33051 2024-09-02 2025-08-11 7.5 - -
CVE-2024-33060 2024-09-02 2025-08-11 8.4 - -
CVE-2024-38422 2024-11-04 2024-11-07 7.8 - -
CVE-2024-38423 2024-11-04 2024-11-07 7.8 - -
CVE-2024-33056 2024-12-02 2024-12-12 8.4 - -
CVE-2025-21449 2025-07-08 2026-02-10 7.5 - -
CVE-2025-21454 2025-07-08 2025-08-11 7.5 - -
CVE-2025-21482 2025-09-24 2025-12-02 7.1 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for qualcomm sdx20m_firmware by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.