CVE-2019-18672

high

Description

Insufficient checks in the finite state machine of the ShapeShift KeepKey hardware wallet before firmware 6.2.2 allow a partial reset of cryptographic secrets to known values via crafted messages. Notably, this breaks the security of U2F for new server registrations and invalidates existing registrations. This vulnerability can be exploited by unauthenticated attackers and the interface is reachable via WebUSB.

References

https://medium.com/shapeshift-stories/shapeshift-security-update-8ec89bb1b4e3

https://medium.com/shapeshift-stories/keepkey-release-notes-v-6f7d2ec78065

https://github.com/keepkey/keepkey-firmware/commit/769714fcb569e7a4faff9530a2d9ac1f9d6e5680

https://blog.inhq.net/posts/keepkey-CVE-2019-18672/

Details

Source: Mitre, NVD

Published: 2019-12-06

Updated: 2020-03-02

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Severity: High