### [CVE-2021-1924](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1924) ![](https://img.shields.io/static/v1?label=Product&message=Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Connectivity%2C%20Snapdragon%20Consumer%20Electronics%20Connectivity%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20IoT%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables%2C%20Snapdragon%20Wired%20Infrastructure%20and%20Networking&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=APQ8009%2C%20APQ8009W%2C%20APQ8016%2C%20APQ8017%2C%20APQ8037%2C%20APQ8052%2C%20APQ8056%2C%20APQ8062%2C%20APQ8064AU%2C%20APQ8076%2C%20APQ8084%2C%20APQ8096AU%2C%20AR3012%2C%20AR7420%2C%20AR8031%2C%20AR8035%2C%20AR9380%2C%20AR9580%2C%20CSR6030%2C%20CSR8811%2C%20CSRA6620%2C%20CSRA6640%2C%20CSRB31024%2C%20FSM10055%2C%20FSM10056%2C%20FSM9900%2C%20FSM9905%2C%20FSM9910%2C%20FSM9915%2C%20FSM9916%2C%20FSM9950%2C%20FSM9955%2C%20IPQ4018%2C%20IPQ4019%2C%20IPQ4028%2C%20IPQ4029%2C%20IPQ5010%2C%20IPQ5018%2C%20IPQ5028%2C%20IPQ6000%2C%20IPQ6005%2C%20IPQ6010%2C%20IPQ6018%2C%20IPQ6028%2C%20IPQ8062%2C%20IPQ8064%2C%20IPQ8065%2C%20IPQ8066%2C%20IPQ8068%2C%20IPQ8069%2C%20IPQ8070%2C%20IPQ8070A%2C%20IPQ8071%2C%20IPQ8071A%2C%20IPQ8072%2C%20IPQ8072A%2C%20IPQ8074%2C%20IPQ8074A%2C%20IPQ8076%2C%20IPQ8076A%2C%20IPQ8078%2C%20IPQ8078A%2C%20IPQ8173%2C%20IPQ8174%2C%20MDM8207%2C%20MDM8635M%2C%20MDM9150%2C%20MDM9205%2C%20MDM9206%2C%20MDM9207%2C%20MDM9225%2C%20MDM9225M%2C%20MDM9230%2C%20MDM9235M%2C%20MDM9250%2C%20MDM9330%2C%20MDM9607%2C%20MDM9625%2C%20MDM9625M%2C%20MDM9626%2C%20MDM9628%2C%20MDM9630%2C%20MDM9635M%2C%20MDM9640%2C%20MDM9645%2C%20MDM9650%2C%20MDM9655%2C%20MSM8108%2C%20MSM8208%2C%20MSM8209%2C%20MSM8608%2C%20MSM8909W%2C%20MSM8916%2C%20MSM8917%2C%20MSM8920%2C%20MSM8937%2C%20MSM8940%2C%20MSM8952%2C%20MSM8956%2C%20MSM8962%2C%20MSM8976%2C%20MSM8976SG%2C%20MSM8996AU%2C%20PM8937%2C%20PMD9635%2C%20PMP8074%2C%20QCA10901%2C%20QCA1990%2C%20QCA4004%2C%20QCA402%20...%5Btruncated*%5D%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Cryptographic%20Issue%20in%20Core&color=brightgreen) ### Description Information disclosure through timing and power side-channels during mod exponentiation for RSA-CRT in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking ### POC #### Reference - https://www.qualcomm.com/company/product-security/bulletins/november-2021-bulletin #### Github No PoCs found on GitHub currently.