CVE-2019-18672

Insufficient checks in the finite state machine of the ShapeShift KeepKey hardware wallet before firmware 6.2.2 allow a partial reset of cryptographic secrets to known values via crafted messages. Notably, this breaks the security of U2F for new server registrations and invalidates existing registrations. This vulnerability can be exploited by unauthenticated attackers and the interface is reachable via WebUSB.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:shapeshift:keepkey_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:shapeshift:keepkey_firmware:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:33

Type Values Removed Values Added
References () https://blog.inhq.net/posts/keepkey-CVE-2019-18672/ - () https://blog.inhq.net/posts/keepkey-CVE-2019-18672/ -
References () https://github.com/keepkey/keepkey-firmware/commit/769714fcb569e7a4faff9530a2d9ac1f9d6e5680 - Patch, Third Party Advisory () https://github.com/keepkey/keepkey-firmware/commit/769714fcb569e7a4faff9530a2d9ac1f9d6e5680 - Patch, Third Party Advisory
References () https://medium.com/shapeshift-stories/keepkey-release-notes-v-6f7d2ec78065 - Third Party Advisory () https://medium.com/shapeshift-stories/keepkey-release-notes-v-6f7d2ec78065 - Third Party Advisory
References () https://medium.com/shapeshift-stories/shapeshift-security-update-8ec89bb1b4e3 - Third Party Advisory () https://medium.com/shapeshift-stories/shapeshift-security-update-8ec89bb1b4e3 - Third Party Advisory

Information

Published : 2019-12-06 18:15

Updated : 2024-11-21 04:33


NVD link : CVE-2019-18672

Mitre link : CVE-2019-18672

CVE.ORG link : CVE-2019-18672


JSON object : View

Products Affected

shapeshift

  • keepkey_firmware
CWE
CWE-354

Improper Validation of Integrity Check Value