Chipset
Qualcomm SM8475
Also known as Snapdragon 8+ Gen 1
Statistics
Released (est):
April 2022
3 years ago
Vulnerabilities:
233
Devices:
77
Vulnerabilities
Id | Severity | Component | Affects | Reported on | Published by manufacturer | Published by AOSP |
---|---|---|---|---|---|---|
CVE-2023-33017 | HIGH | BOOT | FIRMWARE | N/A | Dec 2023 | Dec 2023 |
CVE-2023-33018 | HIGH | DEBUG | N/A | N/A | Dec 2023 | Dec 2023 |
CVE-2023-33042 | HIGH | CELLULAR | FIRMWARE | May 11, 2023 | Dec 2023 | Mar 2024 |
CVE-2023-33043 | HIGH | CELLULAR | FIRMWARE | Apr 20, 2023 | Dec 2023 | Jan 2024 |
CVE-2023-33044 | HIGH | CELLULAR | FIRMWARE | Apr 20, 2023 | Dec 2023 | Jan 2024 |
CVE-2023-33054 | CRITICAL | POSITION | OS | Mar 18, 2023 | Dec 2023 | Dec 2023 |
CVE-2023-33063 | HIGH | N/A | OS | Dec 18, 2022 | Dec 2023 | Dec 2023 |
CVE-2023-33080 | HIGH | WIFI | FIRMWARE | N/A | Dec 2023 | Dec 2023 |
CVE-2023-33047 | HIGH | WIFI | FIRMWARE | N/A | Nov 2023 | Nov 2023 |
CVE-2023-33074 | HIGH | AUDIO | OS | N/A | Nov 2023 | Nov 2023 |
233 of 233 row(s) shown.
Rows per page
Page 1 of 24
Devices
Name | Code name | Manufacturer | Release Date |
---|---|---|---|
Asus ROG Phone 6 Diablo Immortal Edition | Asus ROG Phone 6 Diablo Immortal Edition | ASUS | Nov 18, 2022 |
Asus ROG Phone 6 Batman Edition | AI2203_C | ASUS | Oct 10, 2022 |
Asus Zenfone 9 | AI2202-1A006EU | ASUS | Sep 15, 2022 |
Asus Zenfone 9 | AI2202 | ASUS | Sep 15, 2022 |
Asus Zenfone 9 | AI2202_B | ASUS | Sep 15, 2022 |
Asus ROG Phone 6 Pro | AI2201_D | ASUS | Jul 13, 2022 |
Asus ROG Phone 6 | AI2201_C | ASUS | Jul 13, 2022 |
Asus ROG Phone 6 | AI2201_F | ASUS | Jul 13, 2022 |
Asus ROG Phone 6 | AI2201-1A030EU | ASUS | Jul 13, 2022 |
Asus ROG Phone 6 | AI2201_A | ASUS | Jul 13, 2022 |
77 of 77 row(s) shown.
Rows per page
Page 1 of 8
Information reliability
The information on this website is intended to provide information on the big picture of chipset security and measure trends within the industry. Our information is obtained from several vantage points, checked for consistency, and automatically cross-referenced. However, this process may not always yield reliable information. Do not use the information on a particular vulnerability, chipset or device to verify your individual exposure in cases where inaccuracies are inacceptable, for instance to assess risks if you are a Politically Exposed Person.