On SHIFT BitBox02 devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. Note: BIP39 secrets are not displayed by default on this device. The side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data.
References
Link | Resource |
---|---|
https://blog.inhq.net/posts/oled-side-channel-status-summary/ | Exploit Third Party Advisory |
https://blog.inhq.net/posts/oled-side-channel-status-summary/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.inhq.net/posts/oled-side-channel-status-summary/ - Exploit, Third Party Advisory |
Information
Published : 2019-11-02 17:15
Updated : 2024-11-21 04:33
NVD link : CVE-2019-18673
Mitre link : CVE-2019-18673
CVE.ORG link : CVE-2019-18673
JSON object : View
Products Affected
shiftcrypto
- bitbox02
CWE
CWE-203
Observable Discrepancy