A flawed protocol design in the Ledger Monero app before 1.5.1 for Ledger Nano and Ledger S devices allows a local attacker to extract the master spending key by sending crafted messages to this app selected on a PIN-entered Ledger connected to a host PC.
References
Link | Resource |
---|---|
https://deadcode.me/blog/2020/04/25/Ledger-Monero-app-spend-key-extraction.html | Exploit Third Party Advisory |
https://donjon.ledger.com/lsb/008/ | Exploit Vendor Advisory |
https://deadcode.me/blog/2020/04/25/Ledger-Monero-app-spend-key-extraction.html | Exploit Third Party Advisory |
https://donjon.ledger.com/lsb/008/ | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://deadcode.me/blog/2020/04/25/Ledger-Monero-app-spend-key-extraction.html - Exploit, Third Party Advisory | |
References | () https://donjon.ledger.com/lsb/008/ - Exploit, Vendor Advisory |
Information
Published : 2020-05-06 14:15
Updated : 2024-11-21 05:36
NVD link : CVE-2020-6861
Mitre link : CVE-2020-6861
CVE.ORG link : CVE-2020-6861
JSON object : View
Products Affected
ledger
- nano_s
- monero
- nano_x
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm