
[CIVN-2026-0223] Multiple Vulnerabilities in Qualcomm Products
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Qualcomm Products
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Software Affected
Qualcomm Software Center (QSC) versions QSCv1.17.1, QSCv1.19.1, QSCv1.21.0
Qualcomm Package Manager (QPM) versions QPMv3.0.125.4, QPMv3.0.126.7, QPMv3.0.127.2
Qualcomm WLAN HAL and WLAN Firmware components across multiple Qualcomm chipsets
Qualcomm Bootloader, DSP Service, Camera, PLC Firmware, Automotive GPU, Automotive Audio, and Windows WLAN Host components
Multiple Qualcomm Snapdragon, FastConnect, QCA, QCN, SA-series, WCN-series, and related platforms
Refer to the following security bulletin for the complete list of affected chipsets:
https://docs.qualcomm.com/securitybulletin/may-2026-bulletin.html
Overview
Multiple vulnerabilities have been reported in Qualcomm products and software components, which could allow an attacker to perform remote code execution, privilege escalation, denial of service, memory corruption and information disclosure on the targeted system.
Target Audience:
All end-user organizations and individuals using Qualcomm chipsets and software components.
Risk Assessment:
High risk of remote code execution, privilege escalation, denial of service, memory corruption, and information disclosure.
Impact Assessment:
Potential for remote code execution, privilege escalation, denial of service and/or disclosure of sensitive information.
Description
Qualcomm develops wireless technologies, mobile chipsets, connectivity solutions, automotive platforms, and embedded components used across smartphones, IoT devices, automotive systems, and networking products.
These vulnerabilities have been reported in Qualcomm products due to improper authorization, buffer overflows, memory corruption, use-after-free conditions, exposed dangerous functions, and improper input validation in various software and firmware components.
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, gain elevated privileges, crash affected services, disclose sensitive information, or compromise the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://docs.qualcomm.com/securitybulletin/may-2026-bulletin.html
Vendor Information
Qualcomm
https://www.qualcomm.com/
References
https://docs.qualcomm.com/securitybulletin/may-2026-bulletin.html
CVE Name
CVE-2026-25266
CVE-2026-25293
CVE-2025-47401
CVE-2025-47403
CVE-2025-47404
CVE-2025-47405
CVE-2025-47406
CVE-2026-47407
CVE-2025-47408
CVE-2026-24082
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmn/Lq4ACgkQ3jCgcSdc
ys82yg/9H+abDpYfEtlK3REULJy9Ew6/Lx66ZoUUb7ihGTrdaUp9eJCnKnkr48TO
UKhtQxTREaNuDa1Bb2Dy7f+M6ffde9wNxdsM186tGYWl1yQ56w6oCLiBkUDvw9+Y
R37rdLXxwmwb2d765Mmlw8bEJQIt7w55BzAj9c8RSYaNaYic7jI2g3oRy1NF9e+R
J0YHNLYcbGbgOEwEA6wuIoevfyuKgGivDU9X/ZXaCrE/+Rs9v29OzQ5SiakPm6Kj
/BIEDX+js9Lj0KPiVGJgoekQ2hOrcRthO5J3e+Knhz+vrIkYbUyJwSrMZAnwDmaR
K2IfzFgCFQUFISLbeG8StapMPIBDYb6fBiRz+9LpXNJo64qtjBNRG5ISPVFQIeqv
CqndyDQdhh91mHSYM8TSszwx4qjgzlUUN3wq7GjIj+MtfjQoGFA5fdGMzCRJaz7i
SLsZLs/ciAbLFb2YLq5AgAohh1yH3rjbTT4TNtSWl4d4h7zg3EvZ3pFV6WL6AooP
7uCsvcaV/mJC/g7VVZpRgIXEp5rdHP1ox79ZpEd/qGG4Sz15MUFq2+U0JUntvjd5
fRSALajzxDQ0AZ2damyPQvGK8l5G96KJ7gxmrKkxG1jvTizdOeE2FH4ZB+qOFGGr
GNUr+3grP8FumPdgwRzSNkYGmZtWP1wOkUG+IevxsnkIOFDo5XM=
=EiAY
—–END PGP SIGNATURE—–


