Tracking 4516 chipset vulnerabilities across 6866 different smartphone models.

What is this about?

Every smartphone contains a chipset, enabling functionality such as calls, data connectivity, Bluetooth and WiFi communication, digital image processing and more. Detecting and addressing chipset vulnerabilities is crucial for optimal smartphone security. However, information on these vulnerabilities is scattered across chipset manufacturers' websites, AOSP's Security Bulletins, and OEM websites. Our website consolidates this data for a unified and accessible view.

Vulnerabilities

Explore trends
4516
+36 in March 2026
Monthly amount of published vulnerabilities

Phone models

Show all
6866

Chipsets

Show all
637
each affected by 110 vulnerabilities (avg.)
21184
+179 in March 2026
Phone modelCode nameUpdated in
Samsung Galaxy A22 5GSM-A226BApril 2026
Samsung Galaxy S23 UltraSM-S918BApril 2026
Samsung Galaxy S23 UltraSM-S918BApril 2026
Samsung Galaxy A22 5GSM-A226BApril 2026
Samsung Galaxy S23SM-S911BApril 2026
Samsung Galaxy S23 UltraSM-S918BApril 2026
Samsung Galaxy A14 5GSM-A146U1April 2026
Samsung Galaxy S23 UltraSM-S918UApril 2026
Samsung Galaxy S23SM-S911UApril 2026
Samsung Galaxy A32 5GSM-A326BApril 2026
Samsung Galaxy S23+SM-S916UApril 2026
Samsung Galaxy A32 5GSM-A326BApril 2026
Samsung Galaxy A22 5GSM-A226BRApril 2026
Samsung Galaxy S23 UltraSM-S918U1April 2026
Samsung Galaxy S23SM-S911U1April 2026
Samsung Galaxy S23+SM-S916U1April 2026
Samsung Galaxy S23 FESM-S711UApril 2026
Samsung Galaxy Z Flip5SM-F731UApril 2026
Samsung Galaxy Z Fold5SM-F946UApril 2026
Samsung Galaxy S23 FESM-S711U1April 2026
Samsung Galaxy S23 FESM-S711BApril 2026
Samsung Galaxy Xcover 5SM-G525FMarch 2026
Samsung Galaxy S24+SM-S926UMarch 2026
Samsung Galaxy S24SM-S921UMarch 2026
Samsung Galaxy A53 5GSM-A536U1March 2026
Samsung Galaxy S23SM-S911BMarch 2026
Samsung Galaxy Z Fold5SM-F946BMarch 2026
Samsung Galaxy Xcover 5SM-G525FMarch 2026
Samsung Galaxy S23 UltraSM-S918BMarch 2026
Samsung Galaxy A54SM-A546U1March 2026
And 21154 more...

The big picture.

Our data provides a holistic overview on each phase of the vulnerability lifecycle.

Vulnerability Introduction

Each new chipset release brings exciting features, yet often inherits vulnerabilities from previous generations.

In each new chipset generation...

93 %
of all vulnerabilities are inherhited from previous chipset generations
7%
of all vulnerabilities occur in this chipset generation for the first time

Vulnerability Discovery

Vulnerabilities are either found internally by chipset manufacturers, or by external researchers.

Since 2018, external researchers have found 53% of all published chipset vulnerabilities.

Yearly ratio of published vulnerabilities discovered by external researchers.

The relative amount of externally discovered vulnerabilities differs between chipset manufacturers.

Ratio of published vulnerabilities discovered by external researchers during the past two years, broken down by manufacturer. A lower bar implies that a chipset manufacturer was able to find more vulnerabilities internally.
Ratio of vulnerabilities discovered by chipset manufacturers
Manufacturer20242025
MediaTek39%67%
SAMSUNG LSI0%100%
Qualcomm53%54%
UNISOC2%100%

Patch Development

Once a vulnerability is discovered, the affected chipsets' manufacturer assesses its severity, develops a patch and publishes vulnerability information in the form of a CVE and a bulletin on their website as well as the AOSP.

Severity assessmentAre firmware vulnerabilities more severe?

Firmware

7.8
Median CVSS score of firmware running on chipset co-processors.

Drivers

7.0
Median CVSS score of drivers for chipset functionality.
Time to patch availabilityHow long does it take chipset manufacturers to develop a mitigating patch?

For vulnerabilities published in 2025, it took chipset manufacturers on average 158 days to provide a patch to OEMs, after they have been informed of a vulnerability. This is 3% faster than in 2024.

Based on data provided on the websites of Qualcomm and Samsung.

Update deployment

Time frame from public disclosure to updateUpdates are available for half of all device models within 72 days after a vulnerability is announced.
Time frame from first available updateHalf of all device models have received an update 34 days after the first model affected by that vulnerability.

For researchers.

Our data set aids researchers in tracking vulnerability trends, offering aggregated monthly discovery numbers. This helps focus research efforts on underrepresented or highly vulnerable areas. Additionally, it assesses individual research impact by offering per vulnerability information on impacted chipsets and devices.

Furthermore, evaluating novel vulnerability discovery techniques warrants a representative set of devices to empirically test the success of said techniques. Many chipsets share the same vulnerabilities through code re-use. Manually testing chipsets affected by mostly overlapping sets of vulnerabilities is time consuming, unnecessarily expensive and thus inefficient. Our device picker helps select a variety of devices with chipsets that share fewer vulnerabilities, increasing the likelihood of testing novel implementations rather than re-used ones.

For more information and a detailed analysis of the data presented on this website, please see our paper, to be presented at NDSS'25.
Follow us on Twitter