Chipset
Qualcomm SM7150-AC
Also known as Snapdragon 732G
Statistics
Released (est):
July 2020
4 years ago
Vulnerabilities:
37
Devices:
12
Vulnerabilities
Id | Severity | Component | Affects | Reported on | Published by manufacturer | Published by AOSP |
---|---|---|---|---|---|---|
CVE-2023-33017 | HIGH | BOOT | FIRMWARE | N/A | Dec 2023 | Dec 2023 |
CVE-2023-33018 | HIGH | DEBUG | N/A | N/A | Dec 2023 | Dec 2023 |
CVE-2023-33022 | HIGH | N/A | OS | N/A | Dec 2023 | Dec 2023 |
CVE-2023-33054 | CRITICAL | POSITION | OS | Mar 18, 2023 | Dec 2023 | Dec 2023 |
CVE-2023-33063 | HIGH | N/A | OS | Dec 18, 2022 | Dec 2023 | Dec 2023 |
CVE-2023-33070 | HIGH | N/A | OS | Nov 17, 2022 | Dec 2023 | N/A |
CVE-2023-33080 | HIGH | WIFI | FIRMWARE | N/A | Dec 2023 | Dec 2023 |
CVE-2023-33059 | HIGH | AUDIO | OS | Mar 24, 2023 | Nov 2023 | Nov 2023 |
CVE-2023-22385 | HIGH | CELLULAR | FIRMWARE | N/A | Oct 2023 | Oct 2023 |
CVE-2023-24847 | HIGH | CELLULAR | FIRMWARE | N/A | Oct 2023 | Oct 2023 |
37 of 37 row(s) shown.
Rows per page
Page 1 of 4
Devices
Name | Code name | Manufacturer | Release Date |
---|---|---|---|
Samsung Galaxy Tab S6 Lite (2022) | SM-P613 | SAMSUNG | May 23, 2022 |
Samsung Galaxy Tab S6 Lite (2022) | SM-P619 | SAMSUNG | May 23, 2022 |
Xiaomi Redmi Note 12 Pro 4G | sweet | XIAOMI | Apr 11, 2023 |
Motorola Moto G60 | PANB0001IN | MOTOROLA | Apr 27, 2021 |
Motorola Moto G60 | PANB0013IN | MOTOROLA | Apr 27, 2021 |
Motorola Moto G60 | PANB0015IN | MOTOROLA | Apr 27, 2021 |
Motorola Moto G40 Fusion | PANV0001IN | MOTOROLA | May 1, 2021 |
Motorola Moto G40 Fusion | PANV0005IN | MOTOROLA | May 1, 2021 |
Motorola Moto G40 Fusion | PANV0009IN | MOTOROLA | May 1, 2021 |
Xiaomi Redmi Note 10 Pro | sweetin | XIAOMI | Mar 18, 2021 |
12 of 12 row(s) shown.
Rows per page
Page 1 of 2
Information reliability
The information on this website is intended to provide information on the big picture of chipset security and measure trends within the industry. Our information is obtained from several vantage points, checked for consistency, and automatically cross-referenced. However, this process may not always yield reliable information. Do not use the information on a particular vulnerability, chipset or device to verify your individual exposure in cases where inaccuracies are inacceptable, for instance to assess risks if you are a Politically Exposed Person.