In the KeepKey firmware before 7.3.2,Flaws in the supervisor interface can be exploited to bypass important security restrictions on firmware operations. Using these flaws, malicious firmware code can elevate privileges, permanently make the device inoperable or overwrite the trusted bootloader code to compromise the hardware wallet across reboots or storage wipes.
References
Link | Resource |
---|---|
https://github.com/keepkey/keepkey-firmware/releases/tag/v7.3.2 | Release Notes Third Party Advisory |
https://github.com/keepkey/keepkey-firmware/commit/447c1f038a31378ab9589965c098467d9ea6cccc | Patch Third Party Advisory |
https://blog.inhq.net/posts/keepkey-CVE-2022-30330/ | Exploit Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-05-06 21:15
Updated : 2022-09-29 19:27
NVD link : CVE-2022-30330
Mitre link : CVE-2022-30330
JSON object : View
CWE
CWE-668
Exposure of Resource to Wrong Sphere
Products Affected
keepkey
- keepkey_firmware
- keepkey