Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g75w-vcgr-6v4q

Опубликовано: 08 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 6.6

Описание

In the KeepKey firmware before 7.3.2, the bootloader can be exploited in unusual situations in which the attacker has physical access, convinces the victim to install malicious firmware, or knows the victim's seed phrase. lib/board/supervise.c mishandles svhandler_flash_* address range checks. If exploited, any installed malware could persist even after wiping the device and resetting the firmware.

In the KeepKey firmware before 7.3.2, the bootloader can be exploited in unusual situations in which the attacker has physical access, convinces the victim to install malicious firmware, or knows the victim's seed phrase. lib/board/supervise.c mishandles svhandler_flash_* address range checks. If exploited, any installed malware could persist even after wiping the device and resetting the firmware.

EPSS

Процентиль: 21%
0.0007
Низкий

6.6 Medium

CVSS3

Дефекты

CWE-668

Связанные уязвимости

CVSS3: 6.6
nvd
почти 4 года назад

In the KeepKey firmware before 7.3.2,Flaws in the supervisor interface can be exploited to bypass important security restrictions on firmware operations. Using these flaws, malicious firmware code can elevate privileges, permanently make the device inoperable or overwrite the trusted bootloader code to compromise the hardware wallet across reboots or storage wipes.

EPSS

Процентиль: 21%
0.0007
Низкий

6.6 Medium

CVSS3

Дефекты

CWE-668