### [CVE-2019-10583](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10583) ![](https://img.shields.io/static/v1?label=Product&message=Snapdragon%20Auto%2C%20Snapdragon%20Compute%2C%20Snapdragon%20Consumer%20IOT%2C%20Snapdragon%20Industrial%20IOT%2C%20Snapdragon%20Mobile%2C%20Snapdragon%20Voice%20%26%20Music%2C%20Snapdragon%20Wearables&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=APQ8096AU%2C%20MDM9607%2C%20MSM8909W%2C%20Nicobar%2C%20QCS605%2C%20SA6155P%2C%20SDA845%2C%20SDM429W%2C%20SDM670%2C%20SDM710%2C%20SDM845%2C%20SM6150%2C%20SM8150%2C%20SM8250%2C%20SXR1130%2C%20SXR2130%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Use%20After%20Free%20Issue%20in%20Camera&color=brightgreen) ### Description Use after free issue occurs when camera access sensors data through direct report mode in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8096AU, MDM9607, MSM8909W, Nicobar, QCS605, SA6155P, SDA845, SDM429W, SDM670, SDM710, SDM845, SM6150, SM8150, SM8250, SXR1130, SXR2130 ### POC #### Reference - https://www.qualcomm.com/company/product-security/bulletins/january-2020-bulletin #### Github No PoCs found on GitHub currently.