Onekey Touch devices through 4.0.0 and Onekey Mini devices through 2.10.0 allow man-in-the-middle attackers to obtain the seed phase. The man-in-the-middle access can only be obtained after disassembling a device (i.e., here, "man-in-the-middle" does not refer to the attacker's position on an IP network). NOTE: the vendor states that "our hardware team has updated the security patch without anyone being affected."
References
Link | Resource |
---|---|
https://blog.onekey.so/our-response-to-recent-security-fix-reports-13914fea8afd | Vendor Advisory |
https://github.com/OneKeyHQ/firmware | Product |
https://fortune.com/crypto/2023/02/09/cyber-firm-cracks-onekey-crypto-wallets-in-video-raises-questions-hardware-security/amp/ | Third Party Advisory |
Information
Published : 2023-02-13 23:15
Updated : 2023-02-22 08:15
NVD link : CVE-2023-25758
Mitre link : CVE-2023-25758
JSON object : View
CWE
Products Affected
onekey
- onekey_mini
- onekey_touch_firmware
- onekey_mini_firmware
- onekey_touch