CVE-2022-30330

In the KeepKey firmware before 7.3.2,Flaws in the supervisor interface can be exploited to bypass important security restrictions on firmware operations. Using these flaws, malicious firmware code can elevate privileges, permanently make the device inoperable or overwrite the trusted bootloader code to compromise the hardware wallet across reboots or storage wipes.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:keepkey:keepkey_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:keepkey:keepkey:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:02

Type Values Removed Values Added
References () https://blog.inhq.net/posts/keepkey-CVE-2022-30330/ - Exploit, Patch, Third Party Advisory () https://blog.inhq.net/posts/keepkey-CVE-2022-30330/ - Exploit, Patch, Third Party Advisory
References () https://github.com/keepkey/keepkey-firmware/commit/447c1f038a31378ab9589965c098467d9ea6cccc - Patch, Third Party Advisory () https://github.com/keepkey/keepkey-firmware/commit/447c1f038a31378ab9589965c098467d9ea6cccc - Patch, Third Party Advisory
References () https://github.com/keepkey/keepkey-firmware/releases/tag/v7.3.2 - Release Notes, Third Party Advisory () https://github.com/keepkey/keepkey-firmware/releases/tag/v7.3.2 - Release Notes, Third Party Advisory

08 Aug 2023, 14:22

Type Values Removed Values Added
CWE CWE-668 CWE-20

Information

Published : 2022-05-07 04:15

Updated : 2024-11-21 07:02


NVD link : CVE-2022-30330

Mitre link : CVE-2022-30330

CVE.ORG link : CVE-2022-30330


JSON object : View

Products Affected

keepkey

  • keepkey_firmware
  • keepkey
CWE
CWE-20

Improper Input Validation