Insufficient checks in the USB packet handling of the ShapeShift KeepKey hardware wallet before firmware 6.2.2 allow out-of-bounds writes in the .bss segment via crafted messages. The vulnerability could allow code execution or other forms of impact. It can be triggered by unauthenticated attackers and the interface is reachable via WebUSB.
References
Link | Resource |
---|---|
https://blog.inhq.net/posts/keepkey-CVE-2019-18671/ | |
https://github.com/keepkey/keepkey-firmware/commit/b222c66cdd7c3203d917c80ba615082d309d80c3 | Patch Third Party Advisory |
https://medium.com/shapeshift-stories/keepkey-release-notes-v-6f7d2ec78065 | Release Notes Third Party Advisory |
https://medium.com/shapeshift-stories/shapeshift-security-update-8ec89bb1b4e3 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-12-06T17:53:29
Updated: 2020-02-12T02:53:19
Reserved: 2019-11-02T00:00:00
Link: CVE-2019-18671
JSON object: View
NVD Information
Status : Modified
Published: 2019-12-06T18:15:12.653
Modified: 2020-02-12T03:15:10.943
Link: CVE-2019-18671
JSON object: View
Redhat Information
No data.
CWE