Lucene search

K
cve[email protected]CVE-2023-27892
HistoryMay 02, 2023 - 9:15 p.m.

CVE-2023-27892

2023-05-0221:15:09
CWE-125
web.nvd.nist.gov
11
cve-2023-27892
insufficient length checks
shapeshift keepkey
hardware wallet
buffer overflow
ethereum contracts
bip39 mnemonic
security vulnerability

5.7 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H

5.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.4%

Insufficient length checks in the ShapeShift KeepKey hardware wallet firmware before 7.7.0 allow a global buffer overflow via crafted messages. Flaws in cf_confirmExecTx() in ethereum_contracts.c can be used to reveal arbitrary microcontroller memory on the device screen or crash the device. With physical access to a PIN-unlocked device, attackers can extract the BIP39 mnemonic secret from the hardware wallet.

Affected configurations

NVD
Node
shapeshiftkeepkey_firmwareRange7.5.27.7.0
AND
shapeshiftkeepkeyMatch-

5.7 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H

5.7 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.4%

Related for CVE-2023-27892