Insufficient checks in the finite state machine of the ShapeShift KeepKey hardware wallet before firmware 6.2.2 allow a partial reset of cryptographic secrets to known values via crafted messages. Notably, this breaks the security of U2F for new server registrations and invalidates existing registrations. This vulnerability can be exploited by unauthenticated attackers and the interface is reachable via WebUSB.
References
Link | Resource |
---|---|
https://blog.inhq.net/posts/keepkey-CVE-2019-18672/ | |
https://github.com/keepkey/keepkey-firmware/commit/769714fcb569e7a4faff9530a2d9ac1f9d6e5680 | Patch Third Party Advisory |
https://medium.com/shapeshift-stories/keepkey-release-notes-v-6f7d2ec78065 | Third Party Advisory |
https://medium.com/shapeshift-stories/shapeshift-security-update-8ec89bb1b4e3 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-12-06T17:54:54
Updated: 2020-03-02T14:03:52
Reserved: 2019-11-02T00:00:00
Link: CVE-2019-18672
JSON object: View
NVD Information
Status : Modified
Published: 2019-12-06T18:15:12.700
Modified: 2020-03-02T15:15:10.857
Link: CVE-2019-18672
JSON object: View
Redhat Information
No data.
CWE