Known Exploited Vulnerability
7.8
HIGH CVSS 3.1
CVE-2026-21385
Qualcomm Multiple Chipsets Memory Corruption Vulnerability - [Actively Exploited]
Description

Memory corruption while using alignments for memory allocation.

INFO

Published Date :

March 2, 2026, 5:16 p.m.

Last Modified :

March 4, 2026, 6:13 p.m.

Remotely Exploit :

No
CISA Notification
CISA KEV (Known Exploited Vulnerabilities)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

Description :

Multiple Qualcomm chipsets contain a memory corruption vulnerability while using alignments for memory allocation.

Required Action :

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Known Ransomware Campaign Use:

Unknown

Notes :

Please check with specific vendors (OEMs,) for information on patching status. For more information, please see: https://source.android.com/docs/security/bulletin/2026/2026-03-01 ; https://nvd.nist.gov/vuln/detail/CVE-2026-21385

Affected Products

The following products are affected by CVE-2026-21385 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm qam8295p_firmware
2 Qualcomm qca6391_firmware
3 Qualcomm qca6574au_firmware
4 Qualcomm qca6595au_firmware
5 Qualcomm qca6696_firmware
6 Qualcomm sa6145p_firmware
7 Qualcomm sa6150p_firmware
8 Qualcomm sa6155p_firmware
9 Qualcomm sa8145p_firmware
10 Qualcomm sa8150p_firmware
11 Qualcomm sa8155p_firmware
12 Qualcomm sa8195p_firmware
13 Qualcomm sa8295p_firmware
14 Qualcomm sd_8_gen1_5g_firmware
15 Qualcomm sd865_5g_firmware
16 Qualcomm sw5100_firmware
17 Qualcomm sw5100p_firmware
18 Qualcomm wcd9341_firmware
19 Qualcomm wcd9380_firmware
20 Qualcomm wcd9385_firmware
21 Qualcomm wcn3980_firmware
22 Qualcomm wcn3988_firmware
23 Qualcomm wsa8810_firmware
24 Qualcomm wsa8815_firmware
25 Qualcomm wsa8830_firmware
26 Qualcomm wsa8835_firmware
27 Qualcomm ar8035_firmware
28 Qualcomm csra6620_firmware
29 Qualcomm csra6640_firmware
30 Qualcomm flight_rb5_5g_platform_firmware
31 Qualcomm qca2066_firmware
32 Qualcomm qca6564au_firmware
33 Qualcomm qca6574_firmware
34 Qualcomm qca6574a_firmware
35 Qualcomm qca6584au_firmware
36 Qualcomm qca6595_firmware
37 Qualcomm qca6678aq_firmware
38 Qualcomm qca6698aq_firmware
39 Qualcomm qca8081_firmware
40 Qualcomm qca8337_firmware
41 Qualcomm qcm2290_firmware
42 Qualcomm qcm4325_firmware
43 Qualcomm qcm4490_firmware
44 Qualcomm qcm6490_firmware
45 Qualcomm qcn6024_firmware
46 Qualcomm qcn9011_firmware
47 Qualcomm qcn9012_firmware
48 Qualcomm qcn9024_firmware
49 Qualcomm qcs2290_firmware
50 Qualcomm qcs4290_firmware
51 Qualcomm qcs4490_firmware
52 Qualcomm qrb5165m_firmware
53 Qualcomm qrb5165n_firmware
54 Qualcomm sa4150p_firmware
55 Qualcomm sa6155_firmware
56 Qualcomm sa8155_firmware
57 Qualcomm sd662_firmware
58 Qualcomm sm7325p_firmware
59 Qualcomm snapdragon_662_mobile_platform_firmware
60 Qualcomm snapdragon_7c\+_gen_3_compute_firmware
61 Qualcomm snapdragon_auto_5g_modem-rf_firmware
62 Qualcomm snapdragon_w5\+_gen_1_wearable_platform_firmware
63 Qualcomm snapdragon_x55_5g_modem-rf_system_firmware
64 Qualcomm snapdragon_x65_5g_modem-rf_system_firmware
65 Qualcomm snapdragon_xr2_5g_platform_firmware
66 Qualcomm snapdragon_xr2\+_gen_1_platform_firmware
67 Qualcomm sxr2230p_firmware
68 Qualcomm wcd9326_firmware
69 Qualcomm wcd9335_firmware
70 Qualcomm wcd9360_firmware
71 Qualcomm wcd9370_firmware
72 Qualcomm wcd9375_firmware
73 Qualcomm wcn3910_firmware
74 Qualcomm wcn3950_firmware
75 Qualcomm wcn3990_firmware
76 Qualcomm wsa8832_firmware
77 Qualcomm wcn3660b_firmware
78 Qualcomm wcn3680b_firmware
79 Qualcomm mdm9628_firmware
80 Qualcomm qca6564a_firmware
81 Qualcomm qca6174a_firmware
82 Qualcomm qca9377_firmware
83 Qualcomm sa4155p_firmware
84 Qualcomm sa9000p_firmware
85 Qualcomm fastconnect_6200_firmware
86 Qualcomm fastconnect_6800_firmware
87 Qualcomm fastconnect_6900_firmware
88 Qualcomm fastconnect_7800_firmware
89 Qualcomm mdm9250_firmware
90 Qualcomm qcm6125_firmware
91 Qualcomm sd626_firmware
92 Qualcomm sdm429w_firmware
93 Qualcomm wcn3615_firmware
94 Qualcomm wcn3620_firmware
95 Qualcomm ar8031_firmware
96 Qualcomm vision_intelligence_400_platform_firmware
97 Qualcomm wcd9371_firmware
98 Qualcomm fastconnect_6700_firmware
99 Qualcomm smart_audio_400_platform_firmware
100 Qualcomm snapdragon_4_gen_1_mobile_platform_firmware
101 Qualcomm snapdragon_460_mobile_platform_firmware
102 Qualcomm snapdragon_480_5g_mobile_platform_firmware
103 Qualcomm snapdragon_480\+_5g_mobile_platform_firmware
104 Qualcomm snapdragon_660_mobile_platform_firmware
105 Qualcomm snapdragon_680_4g_mobile_platform_firmware
106 Qualcomm snapdragon_685_4g_mobile_platform_firmware
107 Qualcomm snapdragon_690_5g_mobile_platform_firmware
108 Qualcomm snapdragon_695_5g_mobile_platform_firmware
109 Qualcomm snapdragon_778g_5g_mobile_platform_firmware
110 Qualcomm snapdragon_778g\+_5g_mobile_platform_firmware
111 Qualcomm snapdragon_782g_mobile_platform_firmware
112 Qualcomm snapdragon_8_gen_1_mobile_platform_firmware
113 Qualcomm snapdragon_8\+_gen_1_mobile_platform_firmware
114 Qualcomm snapdragon_865_5g_mobile_platform_firmware
115 Qualcomm snapdragon_865\+_5g_mobile_platform_firmware
116 Qualcomm snapdragon_870_5g_mobile_platform_firmware
117 Qualcomm snapdragon_888_5g_mobile_platform_firmware
118 Qualcomm snapdragon_888\+_5g_mobile_platform_firmware
119 Qualcomm qca9367_firmware
120 Qualcomm wcd9330_firmware
121 Qualcomm apq8098_firmware
122 Qualcomm sda660_firmware
123 Qualcomm snapdragon_8_gen_1_firmware
124 Qualcomm qam8255p_firmware
125 Qualcomm qca6797aq_firmware
126 Qualcomm qcs8550_firmware
127 Qualcomm sa8255p_firmware
128 Qualcomm c-v2x_9150_firmware
129 Qualcomm sm8475p_firmware
130 Qualcomm snapdragon_x12_lte_modem_firmware
131 Qualcomm snapdragon_x5_lte_modem_firmware
132 Qualcomm snapdragon_820_automotive_platform_firmware
133 Qualcomm qualcomm_215_mobile_platform_firmware
134 Qualcomm robotics_rb5_platform_firmware
135 Qualcomm smart_display_200_platform_firmware
136 Qualcomm snapdragon_429_mobile_platform_firmware
137 Qualcomm snapdragon_625_mobile_platform_firmware
138 Qualcomm snapdragon_626_mobile_platform_firmware
139 Qualcomm vision_intelligence_100_platform_firmware
140 Qualcomm vision_intelligence_200_platform_firmware
141 Qualcomm sm8550p_firmware
142 Qualcomm snapdragon_4_gen_2_mobile_platform_firmware
143 Qualcomm snapdragon_8_gen_2_mobile_platform_firmware
144 Qualcomm snapdragon_8\+_gen_2_mobile_platform_firmware
145 Qualcomm wcd9390_firmware
146 Qualcomm wcd9395_firmware
147 Qualcomm wsa8840_firmware
148 Qualcomm wsa8845_firmware
149 Qualcomm wsa8845h_firmware
150 Qualcomm ar8031
151 Qualcomm ar8035
152 Qualcomm csra6620
153 Qualcomm csra6640
154 Qualcomm mdm9628
155 Qualcomm qca6174a
156 Qualcomm qca6391
157 Qualcomm qca6564a
158 Qualcomm qca6564au
159 Qualcomm qca6574
160 Qualcomm qca6574a
161 Qualcomm qca6574au
162 Qualcomm qca6584au
163 Qualcomm qca6595
164 Qualcomm qca6595au
165 Qualcomm qca6696
166 Qualcomm qcm2290
167 Qualcomm qcm6125
168 Qualcomm qcs2290
169 Qualcomm qcs4290
170 Qualcomm sa6145p
171 Qualcomm sa6150p
172 Qualcomm sa6155
173 Qualcomm sa6155p
174 Qualcomm sa8150p
175 Qualcomm sa8155
176 Qualcomm sa8155p
177 Qualcomm sa8195p
178 Qualcomm sd662
179 Qualcomm sd865_5g
180 Qualcomm sdm429w
181 Qualcomm wcd9326
182 Qualcomm wcd9330
183 Qualcomm wcd9335
184 Qualcomm wcd9341
185 Qualcomm wcd9360
186 Qualcomm wcd9370
187 Qualcomm wcd9371
188 Qualcomm wcd9375
189 Qualcomm wcd9380
190 Qualcomm wcd9385
191 Qualcomm wcn3615
192 Qualcomm wcn3620
193 Qualcomm wcn3660b
194 Qualcomm wcn3680b
195 Qualcomm wcn3910
196 Qualcomm wcn3950
197 Qualcomm wcn3980
198 Qualcomm wcn3988
199 Qualcomm wcn3990
200 Qualcomm wsa8810
201 Qualcomm wsa8815
202 Qualcomm wsa8830
203 Qualcomm wsa8835
204 Qualcomm qca8337
205 Qualcomm mdm9250
206 Qualcomm qca9367
207 Qualcomm qca9377
208 Qualcomm qca8081
209 Qualcomm qcn6024
210 Qualcomm qcn9012
211 Qualcomm qcn9024
212 Qualcomm sa8770p_firmware
213 Qualcomm qcm5430_firmware
214 Qualcomm sc8380xp_firmware
215 Qualcomm apq8098
216 Qualcomm sda660
217 Qualcomm qamsrv1h_firmware
218 Qualcomm srv1h_firmware
219 Qualcomm snapdragon_8_gen_3_mobile_platform_firmware
220 Qualcomm qamsrv1m_firmware
221 Qualcomm srv1m_firmware
222 Qualcomm qca6688aq_firmware
223 Qualcomm fastconnect_6700
224 Qualcomm sw5100
225 Qualcomm sw5100p
226 Qualcomm fastconnect_6200
227 Qualcomm fastconnect_6800
228 Qualcomm fastconnect_6900
229 Qualcomm sa8145p
230 Qualcomm snapdragon_865_5g_mobile_platform
231 Qualcomm snapdragon_865\+_5g_mobile_platform
232 Qualcomm snapdragon_870_5g_mobile_platform
233 Qualcomm snapdragon_w5\+_gen_1_wearable_platform
234 Qualcomm snapdragon_x55_5g_modem-rf_system
235 Qualcomm snapdragon_xr2_5g_platform
236 Qualcomm c-v2x_9150
237 Qualcomm qam8295p
238 Qualcomm sa8295p
239 Qualcomm fastconnect_7800
240 Qualcomm qam8255p
241 Qualcomm qca6698aq
242 Qualcomm qualcomm_215_mobile_platform
243 Qualcomm sa8255p
244 Qualcomm sa8770p
245 Qualcomm sa9000p
246 Qualcomm flight_rb5_5g_platform
247 Qualcomm qca6797aq
248 Qualcomm qcm4325
249 Qualcomm qcm4490
250 Qualcomm qcm5430
251 Qualcomm qcm6490
252 Qualcomm qcn9011
253 Qualcomm qcs4490
254 Qualcomm qcs8550
255 Qualcomm qrb5165m
256 Qualcomm qrb5165n
257 Qualcomm robotics_rb5_platform
258 Qualcomm sa4150p
259 Qualcomm sa4155p
260 Qualcomm sc8380xp
261 Qualcomm sd_8_gen1_5g
262 Qualcomm sd626
263 Qualcomm sm7325p
264 Qualcomm sm8550p
265 Qualcomm smart_audio_400_platform
266 Qualcomm smart_display_200_platform
267 Qualcomm snapdragon_4_gen_1_mobile_platform
268 Qualcomm snapdragon_4_gen_2_mobile_platform
269 Qualcomm snapdragon_429_mobile_platform
270 Qualcomm snapdragon_460_mobile_platform
271 Qualcomm snapdragon_480_5g_mobile_platform
272 Qualcomm snapdragon_480\+_5g_mobile_platform
273 Qualcomm snapdragon_625_mobile_platform
274 Qualcomm snapdragon_626_mobile_platform
275 Qualcomm snapdragon_660_mobile_platform
276 Qualcomm snapdragon_662_mobile_platform
277 Qualcomm snapdragon_680_4g_mobile_platform
278 Qualcomm snapdragon_685_4g_mobile_platform
279 Qualcomm snapdragon_690_5g_mobile_platform
280 Qualcomm snapdragon_695_5g_mobile_platform
281 Qualcomm snapdragon_778g_5g_mobile_platform
282 Qualcomm snapdragon_778g\+_5g_mobile_platform
283 Qualcomm snapdragon_782g_mobile_platform
284 Qualcomm snapdragon_7c\+_gen_3_compute
285 Qualcomm snapdragon_8_gen_1_mobile_platform
286 Qualcomm snapdragon_8_gen_2_mobile_platform
287 Qualcomm snapdragon_8\+_gen_1_mobile_platform
288 Qualcomm snapdragon_8\+_gen_2_mobile_platform
289 Qualcomm snapdragon_820_automotive_platform
290 Qualcomm snapdragon_888_5g_mobile_platform
291 Qualcomm snapdragon_888\+_5g_mobile_platform
292 Qualcomm snapdragon_auto_5g_modem-rf
293 Qualcomm snapdragon_x65_5g_modem-rf_system
294 Qualcomm snapdragon_xr2\+_gen_1_platform
295 Qualcomm sxr2230p
296 Qualcomm vision_intelligence_100_platform
297 Qualcomm vision_intelligence_200_platform
298 Qualcomm vision_intelligence_400_platform
299 Qualcomm wcd9390
300 Qualcomm wcd9395
301 Qualcomm wsa8832
302 Qualcomm wsa8840
303 Qualcomm wsa8845
304 Qualcomm wsa8845h
305 Qualcomm qca2066
306 Qualcomm qca6678aq
307 Qualcomm snapdragon_x12_lte_modem
308 Qualcomm snapdragon_x5_lte_modem
309 Qualcomm snapdragon_8_gen_3_mobile_platform
310 Qualcomm qamsrv1h
311 Qualcomm qamsrv1m
312 Qualcomm srv1h
313 Qualcomm srv1m
314 Qualcomm qca6688aq
315 Qualcomm snapdragon_8_gen_1
316 Qualcomm sa7255p_firmware
317 Qualcomm sa7255p
318 Qualcomm sa7775p_firmware
319 Qualcomm sa7775p
320 Qualcomm sa8620p_firmware
321 Qualcomm sa8620p
322 Qualcomm video_collaboration_vc1_platform_firmware
323 Qualcomm video_collaboration_vc1_platform
324 Qualcomm video_collaboration_vc3_platform_firmware
325 Qualcomm video_collaboration_vc3_platform
326 Qualcomm video_collaboration_vc5_platform_firmware
327 Qualcomm video_collaboration_vc5_platform
328 Qualcomm sxr2250p_firmware
329 Qualcomm sxr2250p
330 Qualcomm sm7435_firmware
331 Qualcomm sm7435
332 Qualcomm sm8635_firmware
333 Qualcomm sm8635
334 Qualcomm wcn6755_firmware
335 Qualcomm wcn6755
336 Qualcomm sdx61_firmware
337 Qualcomm sdx61
338 Qualcomm wcd9378_firmware
339 Qualcomm wcd9378
340 Qualcomm wcn7880_firmware
341 Qualcomm wcn7880
342 Qualcomm snapdragon_7\+_gen_2_mobile_platform_firmware
343 Qualcomm snapdragon_7\+_gen_2_mobile_platform
344 Qualcomm snapdragon_7_gen_1_mobile_platform_firmware
345 Qualcomm snapdragon_7_gen_1_mobile_platform
346 Qualcomm snapdragon_6_gen_1_mobile_platform_firmware
347 Qualcomm snapdragon_6_gen_1_mobile_platform
348 Qualcomm wcn6650_firmware
349 Qualcomm wcn6650
350 Qualcomm sm7550_firmware
351 Qualcomm sm7550
352 Qualcomm wcn7881_firmware
353 Qualcomm wcn7881
354 Qualcomm wcn7861_firmware
355 Qualcomm wcn7861
356 Qualcomm wcn7860_firmware
357 Qualcomm wcn7860
358 Qualcomm sm8750p_firmware
359 Qualcomm sm8750p
360 Qualcomm sm8475p
361 Qualcomm sm7675_firmware
362 Qualcomm sm7675
363 Qualcomm sm7675p_firmware
364 Qualcomm sm7675p
365 Qualcomm sm8635p_firmware
366 Qualcomm sm8635p
367 Qualcomm sxr2330p_firmware
368 Qualcomm sxr2330p
369 Qualcomm wcn6450_firmware
370 Qualcomm wcn6450
371 Qualcomm sm8650q_firmware
372 Qualcomm sm8650q
373 Qualcomm qmp1000_firmware
374 Qualcomm qmp1000
375 Qualcomm sm6650p_firmware
376 Qualcomm sm6650p
377 Qualcomm sm7635p_firmware
378 Qualcomm sm7635p
379 Qualcomm snapdragon_ar1_gen_1_platform_firmware
380 Qualcomm snapdragon_ar1_gen_1_platform
381 Qualcomm qca6698au_firmware
382 Qualcomm qca6698au
383 Qualcomm sm7550p_firmware
384 Qualcomm sm7550p
385 Qualcomm robotics_rb2_platform_firmware
386 Qualcomm robotics_rb2_platform
387 Qualcomm qca8695au_firmware
388 Qualcomm qca8695au
389 Qualcomm sxr2350p_firmware
390 Qualcomm sxr2350p
391 Qualcomm sm6225p_firmware
392 Qualcomm sm6225p
393 Qualcomm g1_gen_1_firmware
394 Qualcomm g1_gen_1
395 Qualcomm g2_gen_1_firmware
396 Qualcomm g2_gen_1
397 Qualcomm lemans_au_lgit_firmware
398 Qualcomm lemans_au_lgit
399 Qualcomm lemansau_firmware
400 Qualcomm lemansau
401 Qualcomm milos_firmware
402 Qualcomm milos
403 Qualcomm monaco_iot_firmware
404 Qualcomm monaco_iot
405 Qualcomm netrani_firmware
406 Qualcomm netrani
407 Qualcomm orne_firmware
408 Qualcomm orne
409 Qualcomm palawan25_firmware
410 Qualcomm palawan25
411 Qualcomm sar2130p_firmware
412 Qualcomm sar2130p
413 Qualcomm snapdragon_8_elite_firmware
414 Qualcomm snapdragon_8_elite
415 Qualcomm iq-8275_firmware
416 Qualcomm iq-8275
417 Qualcomm iq-8300_firmware
418 Qualcomm iq-8300
419 Qualcomm iq-615_firmware
420 Qualcomm iq-615
421 Qualcomm iq-9075_firmware
422 Qualcomm iq-9075
423 Qualcomm iq-9100_firmware
424 Qualcomm iq-9100
425 Qualcomm pandeiro_firmware
426 Qualcomm pandeiro
427 Qualcomm sw6100_firmware
428 Qualcomm sw6100
429 Qualcomm sw6100p_firmware
430 Qualcomm sw6100p
431 Qualcomm themisto_firmware
432 Qualcomm themisto
433 Qualcomm qln1083bd_firmware
434 Qualcomm qln1083bd
435 Qualcomm qln1086bd_firmware
436 Qualcomm qln1086bd
437 Qualcomm qpa1083bd_firmware
438 Qualcomm qpa1083bd
439 Qualcomm qpa1086bd_firmware
440 Qualcomm qpa1086bd
441 Qualcomm qxm1083_firmware
442 Qualcomm qxm1083
443 Qualcomm qxm1086_firmware
444 Qualcomm qxm1086
445 Qualcomm qxm1093_firmware
446 Qualcomm qxm1093
447 Qualcomm qxm1094_firmware
448 Qualcomm qxm1094
449 Qualcomm qxm1095_firmware
450 Qualcomm qxm1095
451 Qualcomm qxm1096_firmware
452 Qualcomm qxm1096
453 Qualcomm sar1165p_firmware
454 Qualcomm sar1165p
455 Qualcomm sar1250p_firmware
456 Qualcomm sar1250p
457 Qualcomm sar2230p_firmware
458 Qualcomm sar2230p
459 Qualcomm snapdragon_6_gen_3_mobile_platform_firmware
460 Qualcomm snapdragon_6_gen_3_mobile_platform
461 Qualcomm snapdragon_6_gen_4_mobile_platform_firmware
462 Qualcomm snapdragon_6_gen_4_mobile_platform
463 Qualcomm snapdragon_7s_gen_3_mobile_platform_firmware
464 Qualcomm snapdragon_7s_gen_3_mobile_platform
465 Qualcomm snapdragon_8_elite_gen_5_firmware
466 Qualcomm snapdragon_8_elite_gen_5
467 Qualcomm snapdragon_ar1\+_gen_1_platform_firmware
468 Qualcomm snapdragon_ar1\+_gen_1_platform
469 Qualcomm 5g_fixed_wireless_access_platform_firmware
470 Qualcomm 5g_fixed_wireless_access_platform
471 Qualcomm fsm100_platform_firmware
472 Qualcomm fsm100_platform
473 Qualcomm snapdragon_820am_firmware
474 Qualcomm snapdragon_820am
475 Qualcomm snapdragon_x53_5g_modem-rf_system_firmware
476 Qualcomm snapdragon_x53_5g_modem-rf_system
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 HIGH 2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
CVSS 3.1 HIGH [email protected]
Solution
Fix memory corruption issues by validating alignment in memory allocation logic.
  • Validate alignment in memory allocation.
  • Review memory allocation routines.
  • Test memory allocation thoroughly.
  • Apply memory safety patches.
Public PoC/Exploit Available at Github

CVE-2026-21385 has a 4 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2026-21385.

URL Resource
https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html Patch Vendor Advisory
https://source.android.com/docs/security/bulletin/2026/2026-03-01 Vendor Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21385 US Government Resource
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2026-21385 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2026-21385 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Python

Updated: 2 days, 11 hours ago
0 stars 0 fork 0 watcher
Born at : March 22, 2026, 9:01 p.m. This repo has been linked 1 different CVEs too.

A tool to scan Android devices for the recently exploited Qualcomm flaw CVE-2026-21385, providing a simple and efficient way to identify vulnerable devices and apply necessary patches.

automation cve cybersecurity scanner security tool

Python

Updated: 2 weeks, 4 days ago
1 stars 0 fork 0 watcher
Born at : March 4, 2026, 1:40 a.m. This repo has been linked 1 different CVEs too.

CVE POC repo 자동 수집기

Python

Updated: 4 days, 8 hours ago
8 stars 3 fork 3 watcher
Born at : June 8, 2025, 3:07 p.m. This repo has been linked 272 different CVEs too.

📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.

security cve exploit poc vulnerability

Updated: 3 days, 8 hours ago
7589 stars 1242 fork 1242 watcher
Born at : Dec. 8, 2019, 1:03 p.m. This repo has been linked 778 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2026-21385 vulnerability anywhere in the article.

  • The Hacker News
Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131 for Root Access

Amazon Threat Intelligence is warning of an active Interlock ransomware campaign that's exploiting a recently disclosed critical security flaw in Cisco Secure Firewall Management Center (FMC) Software ... Read more

Published Date: Mar 18, 2026 (6 days, 16 hours ago)
  • The Hacker News
9 Critical IP KVM Flaws Enable Unauthenticated Root Access Across Four Vendors

Cybersecurity researchers have warned about the risks posed by low-cost IP KVM (Keyboard, Video, Mouse over Internet Protocol) devices, which can grant attackers extensive control over compromised hos ... Read more

Published Date: Mar 18, 2026 (6 days, 20 hours ago)
  • The Hacker News
Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit

A high-severity security flaw affecting default installations of Ubuntu Desktop versions 24.04 and later could be exploited to escalate privileges to the root level. Tracked as CVE-2026-3888 (CVSS sco ... Read more

Published Date: Mar 18, 2026 (1 week ago)
  • The Hacker News
Apple Fixes WebKit Vulnerability Enabling Same-Origin Policy Bypass on iOS and macOS

Apple on Tuesday released its first round of Background Security Improvements to address a security flaw in WebKit that affects iOS, iPadOS, and macOS. The vulnerability, tracked as CVE-2026-20643 (CV ... Read more

Published Date: Mar 18, 2026 (1 week ago)
  • The Hacker News
Critical Unpatched Telnetd Flaw (CVE-2026-32746) Enables Unauthenticated Root RCE via Port 23

Cybersecurity researchers have disclosed a critical security flaw impacting the GNU InetUtils telnet daemon (telnetd) that could be exploited by an unauthenticated remote attacker to execute arbitrary ... Read more

Published Date: Mar 18, 2026 (1 week ago)
  • The Hacker News
AI Flaws in Amazon Bedrock, LangSmith, and SGLang Enable Data Exfiltration and RCE

Cybersecurity researchers have disclosed details of a new method for exfiltrating sensitive data from artificial intelligence (AI) code execution environments using domain name system (DNS) queries. I ... Read more

Published Date: Mar 17, 2026 (1 week ago)
  • The Hacker News
CISA Flags Actively Exploited Wing FTP Vulnerability Leaking Server Paths

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a medium-severity security flaw impacting Wing FTP to its Known Exploited Vulnerabilities (KEV) catalog, citing evidenc ... Read more

Published Date: Mar 17, 2026 (1 week, 1 day ago)
  • The Hacker News
Google Fixes Two Chrome Zero-Days Exploited in the Wild Affecting Skia and V8

Google on Thursday released security updates for its Chrome web browser to address two high-severity vulnerabilities that it said have been exploited in the wild. The list of vulnerabilities is as fol ... Read more

Published Date: Mar 13, 2026 (1 week, 4 days ago)
  • The Hacker News
Veeam Patches 7 Critical Backup & Replication Flaws Allowing Remote Code Execution

Veeam has released security updates to address multiple critical vulnerabilities in its Backup & Replication software that, if successfully exploited, could result in remote code execution. The vulner ... Read more

Published Date: Mar 13, 2026 (1 week, 5 days ago)
  • The Hacker News
Apple Issues Security Updates for Older iOS Devices Targeted by Coruna WebKit Exploit

Apple on Wednesday backported fixes for a security flaw in iOS, iPadOS, and macOS Sonoma to older versions after it was found to be used as part of the Coruna exploit kit. The vulnerability, tracked a ... Read more

Published Date: Mar 12, 2026 (1 week, 5 days ago)
  • The Hacker News
CISA Flags Actively Exploited n8n RCE Bug as 24,700 Instances Remain Exposed

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting n8n to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of ac ... Read more

Published Date: Mar 12, 2026 (1 week, 6 days ago)
  • The Hacker News
Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials

Cybersecurity researchers have disclosed details of two now-patched security flaws in the n8n workflow automation platform, including two critical bugs that could result in arbitrary command execution ... Read more

Published Date: Mar 11, 2026 (1 week, 6 days ago)
  • The Hacker News
Dozens of Vendors Patch Security Flaws Across Enterprise Software and Network Devices

SAP has released security updates to address two critical security flaws that could be exploited to achieve arbitrary code execution on affected systems. The vulnerabilities in question listed below - ... Read more

Published Date: Mar 11, 2026 (1 week, 6 days ago)
  • The Hacker News
Microsoft Patches 84 Flaws in March Patch Tuesday, Including Two Public Zero-Days

Microsoft on Tuesday released patches for a set of 84 new security vulnerabilities affecting various software components, including two that have been listed as publicly known. Of these, eight are rat ... Read more

Published Date: Mar 11, 2026 (1 week, 6 days ago)
  • The Hacker News
Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets

Cybersecurity researchers have discovered five malicious Rust crates that masquerade as time-related utilities to transmit .env file data to the threat actors. The Rust packages, published to crates.i ... Read more

Published Date: Mar 11, 2026 (2 weeks ago)
  • The Hacker News
FortiGate Devices Exploited to Breach Networks and Steal Service Account Credentials

Cybersecurity researchers are calling attention to a new campaign where threat actors are abusing FortiGate Next-Generation Firewall (NGFW) appliances as entry points to breach victim networks. The ac ... Read more

Published Date: Mar 10, 2026 (2 weeks ago)
  • The Hacker News
The Zero-Day Scramble is Avoidable: A Guide to Attack Surface Reduction

You can't control when the next critical vulnerability drops. You can control how much of your environment is exposed when it does. The problem is that most teams have more internet-facing exposure th ... Read more

Published Date: Mar 10, 2026 (2 weeks ago)
  • The Hacker News
CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. Th ... Read more

Published Date: Mar 10, 2026 (2 weeks, 1 day ago)
  • Help Net Security
Week in review: Weaponized OAuth redirection logic delivers malware, Patch Tuesday forecast

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: BlacksmithAI: Open-source AI-powered penetration testing framework BlacksmithAI is an open-source pene ... Read more

Published Date: Mar 08, 2026 (2 weeks, 2 days ago)
  • CybersecurityNews
CISA warns of Qualcomm Chipsets Memory Corruption Vulnerability Exploited in Attacks

CISA has warned that a memory corruption flaw in Qualcomm chipsets is being exploited in attacks, urging organizations to promptly apply vendor-provided mitigations. The issue, tracked as CVE-2026-213 ... Read more

Published Date: Mar 04, 2026 (2 weeks, 6 days ago)

The following table lists the changes that have been made to the CVE-2026-21385 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Reanalysis by [email protected]

    Mar. 04, 2026

    Action Type Old Value New Value
    Changed CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8_gen_1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:o:qualcomm:snapdragon_8_gen_1:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:qualcomm:snapdragon_8_gen_1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8_gen_1:-:*:*:*:*:*:*:*
  • Reanalysis by [email protected]

    Mar. 04, 2026

    Action Type Old Value New Value
    Changed CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:qualcomm:snapdragon_8_gen_1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:o:qualcomm:snapdragon_8_gen_1:-:*:*:*:*:*:*:*
    Changed CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:* AND OR *cpe:2.3:o:qualcomm:snapdragon_8_gen_1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:o:qualcomm:snapdragon_8_gen_1:-:*:*:*:*:*:*:*
  • Initial Analysis by [email protected]

    Mar. 04, 2026

    Action Type Old Value New Value
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7675p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7675p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8475p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8475p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8635:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8635p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8635p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8650q_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8650q:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8750p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8750p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smart_audio_400_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smart_audio_400_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:smart_display_200_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:smart_display_200_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_429_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_460_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_460_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_480+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_480+_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_6_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_6_gen_1_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_6_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_6_gen_3_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_6_gen_4_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_6_gen_4_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_625_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_625_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_626_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_626_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_660_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_660_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_662_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_662_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_680_4g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_685_4g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_685_4g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_690_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_7+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_7+_gen_2_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_7_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_7_gen_1_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_778g+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_778g+_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_782g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_782g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_7c+_gen_3_compute_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_7c+_gen_3_compute:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_7s_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_7s_gen_3_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8+_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8+_gen_1_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8+_gen_2_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8_elite_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8_elite:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8_elite_gen_5_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8_elite_gen_5:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:5g_fixed_wireless_access_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:5g_fixed_wireless_access_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:c-v2x_9150_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:c-v2x_9150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:flight_rb5_5g_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:flight_rb5_5g_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fsm100_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fsm100_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:g1_gen_1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:g1_gen_1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:g2_gen_1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:g2_gen_1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:iq-615_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:iq-615:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:iq-8275_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:iq-8275:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:iq-8300_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:iq-8300:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:iq-9075_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:iq-9075:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:iq-9100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:iq-9100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:lemans_au_lgit_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:lemans_au_lgit:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:lemansau_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:lemansau:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9250_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9250:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:milos_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:milos:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:monaco_iot_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:monaco_iot:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:netrani_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:netrani:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:orne_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:orne:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:palawan25_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:palawan25:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pandeiro_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pandeiro:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca2066_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca2066:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_820_automotive_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_820_automotive_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_820am_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_820am:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_865+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_865+_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_888+_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_888+_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_ar1+_gen_1_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_ar1+_gen_1_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_ar1_gen_1_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_ar1_gen_1_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_w5+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_w5+_gen_1_wearable_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x12_lte_modem_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x12_lte_modem:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x5_lte_modem_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x5_lte_modem:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x53_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x53_5g_modem-rf_system:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_xr2+_gen_1_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_xr2+_gen_1_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sw6100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sw6100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sw6100p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sw6100p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2250p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2330p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2330p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2350p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2350p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:themisto_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:themisto:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:video_collaboration_vc1_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:video_collaboration_vc3_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:video_collaboration_vc5_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:video_collaboration_vc5_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:vision_intelligence_100_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:vision_intelligence_100_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:vision_intelligence_200_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:vision_intelligence_200_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:vision_intelligence_400_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:vision_intelligence_400_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9330_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9330:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9360_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9360:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6678aq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6678aq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6688aq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6698au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6698au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8695au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8695au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9011:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qln1083bd_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qln1083bd:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qln1086bd_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qln1086bd:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qmp1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qmp1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qpa1083bd_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qpa1083bd:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qpa1086bd_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qpa1086bd:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qualcomm_215_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qualcomm_215_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qxm1083_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qxm1083:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qxm1086_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qxm1086:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qxm1093_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qxm1093:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qxm1094_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qxm1094:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qxm1095_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qxm1095:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qxm1096_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qxm1096:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9371_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9371:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9378:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6450_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6450:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6650_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6650:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6755:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn7860_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn7860:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn7861:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn7880_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn7880:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn7881:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:robotics_rb2_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:robotics_rb2_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:robotics_rb5_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:robotics_rb5_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa4150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa4150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa4155p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa4155p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa7255p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa7775p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8620p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sar1165p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sar1165p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sar1250p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sar1250p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sar2130p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sar2130p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sar2230p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sar2230p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd_8_gen1_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd626_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd626:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sdx61_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sdx61:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6225p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6225p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6650p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6650p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7435_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7435:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7550_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7550:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7550p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7550p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7635p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7635p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7675_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7675:-:*:*:*:*:*:*:*
    Added Reference Type Qualcomm, Inc.: https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html Types: Patch, Vendor Advisory
    Added Reference Type CISA-ADP: https://source.android.com/docs/security/bulletin/2026/2026-03-01 Types: Vendor Advisory
    Added Reference Type CISA-ADP: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21385 Types: US Government Resource
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Mar. 03, 2026

    Action Type Old Value New Value
    Added Reference https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-21385
  • CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725

    Mar. 03, 2026

    Action Type Old Value New Value
    Added Date Added 2026-03-03
    Added Due Date 2026-03-24
    Added Required Action Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
    Added Vulnerability Name Qualcomm Multiple Chipsets Memory Corruption Vulnerability
  • CVE Modified by 134c704f-9b21-4f2e-91b3-4a467353bcc0

    Mar. 02, 2026

    Action Type Old Value New Value
    Added Reference https://source.android.com/docs/security/bulletin/2026/2026-03-01
  • New CVE Received by [email protected]

    Mar. 02, 2026

    Action Type Old Value New Value
    Added Description Memory corruption while using alignments for memory allocation.
    Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    Added CWE CWE-190
    Added Reference https://docs.qualcomm.com/product/publicresources/securitybulletin/march-2026-bulletin.html
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.