Chipset
Qualcomm SM8350
Also known as Snapdragon 888
Statistics
Released (est):
January 2021
5 years ago
Vulnerabilities:
279
Devices:
142
Vulnerabilities
| Id | Severity | Component | Affects | Reported on | Published by manufacturer | Published by AOSP |
|---|---|---|---|---|---|---|
| CVE-2025-27070 | HIGH | N/A | N/A | Dec 1, 2024 | Nov 2025 | Dec 2025 |
| CVE-2025-27053 | HIGH | TRUST | OS | Nov 20, 2024 | Oct 2025 | Dec 2025 |
| CVE-2025-27054 | HIGH | GPU | N/A | N/A | Oct 2025 | Dec 2025 |
| CVE-2025-21481 | HIGH | TRUST | OS | Dec 1, 2024 | Sep 2025 | Sep 2025 |
| CVE-2025-27032 | HIGH | VIRTUALIZATION | OS | N/A | Sep 2025 | Sep 2025 |
| CVE-2025-21464 | MEDIUM | N/A | N/A | N/A | Aug 2025 | Sep 2025 |
| CVE-2025-21465 | MEDIUM | N/A | N/A | N/A | Aug 2025 | Sep 2025 |
| CVE-2025-27062 | HIGH | N/A | OS | Jul 12, 2022 | Aug 2025 | N/A |
| CVE-2025-27066 | HIGH | WIFI | FIRMWARE | N/A | Aug 2025 | Sep 2025 |
| CVE-2024-53009 | MEDIUM | IPC | N/A | N/A | Jul 2025 | N/A |
279 of 279 row(s) shown.
Rows per page
Page 1 of 28
Devices
| Name | Code name | Manufacturer | Release Date |
|---|---|---|---|
| Asus ROG Phone 5s Pro | ZS676KS | ASUS | Aug 25, 2021 |
| Asus Smartphone for Snapdragon Insiders | Asus Smartphone for Snapdragon Insiders | ASUS | Aug 31, 2021 |
| Asus Zenfone 8 Flip | ZS672KS | ASUS | May 13, 2021 |
| Asus Zenfone 8 Flip | I004D | ASUS | May 13, 2021 |
| Asus Zenfone 8 | ZS590KS | ASUS | May 13, 2021 |
| Asus Zenfone 8 | ZS590KS-2A007EU | ASUS | May 13, 2021 |
| Asus Zenfone 8 | I006D | ASUS | May 13, 2021 |
| Asus ROG Phone 5 Ultimate | ZS673KS | ASUS | Apr 26, 2021 |
| Asus ROG Phone 5 Ultimate | ZS673KS-1B063IN | ASUS | Jun 7, 2021 |
| Asus ROG Phone 5 Ultimate | I005DC | ASUS | Jun 7, 2021 |
142 of 142 row(s) shown.
Rows per page
Page 1 of 15
Information reliability
The information on this website is intended to provide information on the big picture of chipset security and measure trends within the industry. Our information is obtained from several vantage points, checked for consistency, and automatically cross-referenced. However, this process may not always yield reliable information. Do not use the information on a particular vulnerability, chipset or device to verify your individual exposure in cases where inaccuracies are inacceptable, for instance to assess risks if you are a Politically Exposed Person.