← Back to CVEs
CVE-2019-18672
HIGH7.5
Description
Insufficient checks in the finite state machine of the ShapeShift KeepKey hardware wallet before firmware 6.2.2 allow a partial reset of cryptographic secrets to known values via crafted messages. Notably, this breaks the security of U2F for new server registrations and invalidates existing registrations. This vulnerability can be exploited by unauthenticated attackers and the interface is reachable via WebUSB.
CVE Details
CVSS v3.1 Score7.5
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published12/6/2019
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
shapeshift:keepkey_firmware
Weaknesses (CWE)
CWE-354
References
https://blog.inhq.net/posts/keepkey-CVE-2019-18672/(cve@mitre.org)
https://github.com/keepkey/keepkey-firmware/commit/769714fcb569e7a4faff9530a2d9ac1f9d6e5680(cve@mitre.org)
https://blog.inhq.net/posts/keepkey-CVE-2019-18672/(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/keepkey/keepkey-firmware/commit/769714fcb569e7a4faff9530a2d9ac1f9d6e5680(af854a3a-2127-422b-91ae-364da2661108)
https://medium.com/shapeshift-stories/keepkey-release-notes-v-6f7d2ec78065(af854a3a-2127-422b-91ae-364da2661108)
https://medium.com/shapeshift-stories/shapeshift-security-update-8ec89bb1b4e3(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.