Insufficient checks in the finite state machine of the ShapeShift KeepKey hardware wallet before firmware 6.2.2 allow a partial reset of cryptographic secrets to known values via crafted messages. Notably, this breaks the security of U2F for new server registrations and invalidates existing registrations. This vulnerability can be exploited by unauthenticated attackers and the interface is reachable via WebUSB.
References
Link | Resource |
---|---|
https://medium.com/shapeshift-stories/shapeshift-security-update-8ec89bb1b4e3 | Third Party Advisory |
https://medium.com/shapeshift-stories/keepkey-release-notes-v-6f7d2ec78065 | Third Party Advisory |
https://github.com/keepkey/keepkey-firmware/commit/769714fcb569e7a4faff9530a2d9ac1f9d6e5680 | Patch Third Party Advisory |
https://blog.inhq.net/posts/keepkey-CVE-2019-18672/ |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2019-12-06 10:15
Updated : 2020-03-02 07:15
NVD link : CVE-2019-18672
Mitre link : CVE-2019-18672
JSON object : View
CWE
CWE-354
Improper Validation of Integrity Check Value
Products Affected
shapeshift
- keepkey_firmware