[CIVN-2026-0223] Multiple Vulnerabilities in Qualcomm Products

By Published On: May 9, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in Qualcomm Products


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: CRITICAL


Software Affected


Qualcomm Software Center (QSC) versions QSCv1.17.1, QSCv1.19.1, QSCv1.21.0

Qualcomm Package Manager (QPM) versions QPMv3.0.125.4, QPMv3.0.126.7, QPMv3.0.127.2

Qualcomm WLAN HAL and WLAN Firmware components across multiple Qualcomm chipsets

Qualcomm Bootloader, DSP Service, Camera, PLC Firmware, Automotive GPU, Automotive Audio, and Windows WLAN Host components

Multiple Qualcomm Snapdragon, FastConnect, QCA, QCN, SA-series, WCN-series, and related platforms

Refer to the following security bulletin for the complete list of affected chipsets:

https://docs.qualcomm.com/securitybulletin/may-2026-bulletin.html


Overview


Multiple vulnerabilities have been reported in Qualcomm products and software components, which could allow an attacker to perform remote code execution, privilege escalation, denial of service, memory corruption and information disclosure on the targeted system.


Target Audience:

All end-user organizations and individuals using Qualcomm chipsets and software components.


Risk Assessment:

High risk of remote code execution, privilege escalation, denial of service, memory corruption, and information disclosure.


Impact Assessment:

Potential for remote code execution, privilege escalation, denial of service and/or disclosure of sensitive information.


Description


Qualcomm develops wireless technologies, mobile chipsets, connectivity solutions, automotive platforms, and embedded components used across smartphones, IoT devices, automotive systems, and networking products.


These vulnerabilities have been reported in Qualcomm products due to improper authorization, buffer overflows, memory corruption, use-after-free conditions, exposed dangerous functions, and improper input validation in various software and firmware components.


Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, gain elevated privileges, crash affected services, disclose sensitive information, or compromise the targeted system.


Solution


Apply appropriate updates as mentioned by the vendor:

https://docs.qualcomm.com/securitybulletin/may-2026-bulletin.html



Vendor Information


Qualcomm

https://www.qualcomm.com/


References


 

https://docs.qualcomm.com/securitybulletin/may-2026-bulletin.html


CVE Name

CVE-2026-25266

CVE-2026-25293

CVE-2025-47401

CVE-2025-47403

CVE-2025-47404

CVE-2025-47405

CVE-2025-47406

CVE-2026-47407

CVE-2025-47408

CVE-2026-24082




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmn/Lq4ACgkQ3jCgcSdc

ys82yg/9H+abDpYfEtlK3REULJy9Ew6/Lx66ZoUUb7ihGTrdaUp9eJCnKnkr48TO

UKhtQxTREaNuDa1Bb2Dy7f+M6ffde9wNxdsM186tGYWl1yQ56w6oCLiBkUDvw9+Y

R37rdLXxwmwb2d765Mmlw8bEJQIt7w55BzAj9c8RSYaNaYic7jI2g3oRy1NF9e+R

J0YHNLYcbGbgOEwEA6wuIoevfyuKgGivDU9X/ZXaCrE/+Rs9v29OzQ5SiakPm6Kj

/BIEDX+js9Lj0KPiVGJgoekQ2hOrcRthO5J3e+Knhz+vrIkYbUyJwSrMZAnwDmaR

K2IfzFgCFQUFISLbeG8StapMPIBDYb6fBiRz+9LpXNJo64qtjBNRG5ISPVFQIeqv

CqndyDQdhh91mHSYM8TSszwx4qjgzlUUN3wq7GjIj+MtfjQoGFA5fdGMzCRJaz7i

SLsZLs/ciAbLFb2YLq5AgAohh1yH3rjbTT4TNtSWl4d4h7zg3EvZ3pFV6WL6AooP

7uCsvcaV/mJC/g7VVZpRgIXEp5rdHP1ox79ZpEd/qGG4Sz15MUFq2+U0JUntvjd5

fRSALajzxDQ0AZ2damyPQvGK8l5G96KJ7gxmrKkxG1jvTizdOeE2FH4ZB+qOFGGr

GNUr+3grP8FumPdgwRzSNkYGmZtWP1wOkUG+IevxsnkIOFDo5XM=

=EiAY

—–END PGP SIGNATURE—–

Share this article