### [CVE-2021-1923](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1923) ![](https://img.shields.io/static/v1?label=Product&message=Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Industrial%20IOT&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=AQT1000%2C%20QCA6390%2C%20QCA6391%2C%20QCA6420%2C%20QCA6421%2C%20QCA6426%2C%20QCA6430%2C%20QCA6431%2C%20QCA6436%2C%20QCA6574%2C%20QCA6574A%2C%20QCA6574AU%2C%20QCA6595%2C%20QCA6595AU%2C%20QCA6696%2C%20QCM2290%2C%20QCM4290%2C%20QCS2290%2C%20QCS4290%2C%20QSM8350%2C%20SA6145P%2C%20SA6150P%2C%20SA6155%2C%20SA6155P%2C%20SA8145P%2C%20SA8150P%2C%20SA8155%2C%20SA8155P%2C%20SA8195P%2C%20SD%20675%2C%20SD%208C%2C%20SD%208CX%2C%20SD460%2C%20SD480%2C%20SD662%2C%20SD665%2C%20SD670%2C%20SD675%2C%20SD678%2C%20SD690%205G%2C%20SD720G%2C%20SD730%2C%20SD750G%2C%20SD765%2C%20SD765G%2C%20SD768G%2C%20SD778G%2C%20SD780G%2C%20SD855%2C%20SD865%205G%2C%20SD870%2C%20SD888%205G%2C%20SDM830%2C%20SDX24%2C%20SDX50M%2C%20SDX55%2C%20SDX55M%2C%20SDXR2%205G%2C%20SM4125%2C%20SM6250%2C%20SM7250P%2C%20SM7325P%2C%20WCD9340%2C%20WCD9360%2C%20WCD9370%2C%20WCD9375%2C%20WCD9380%2C%20WCD9385%2C%20WCN3910%2C%20WCN3950%2C%20WCN3988%2C%20WCN3991%2C%20WCN3998%2C%20WCN6740%2C%20WCN6750%2C%20WCN6850%2C%20WCN6851%2C%20WCN6855%2C%20WCN6856%2C%20WHS9410%2C%20WSA8810%2C%20WSA8815%2C%20WSA8830%2C%20WSA8835%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Incorrect%20Type%20Conversion%20or%20Cast%20in%20Trusted%20Application&color=brightgreen) ### Description Incorrect pointer argument passed to trusted application TA could result in un-intended memory operations in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT ### POC #### Reference - https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin #### Github No PoCs found on GitHub currently.