Vulnerability Description
Insufficient checks in the finite state machine of the ShapeShift KeepKey hardware wallet before firmware 6.2.2 allow a partial reset of cryptographic secrets to known values via crafted messages. Notably, this breaks the security of U2F for new server registrations and invalidates existing registrations. This vulnerability can be exploited by unauthenticated attackers and the interface is reachable via WebUSB.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Shapeshift | Keepkey Firmware | < 6.2.2 |
Related Weaknesses (CWE)
References
- https://blog.inhq.net/posts/keepkey-CVE-2019-18672/
- https://github.com/keepkey/keepkey-firmware/commit/769714fcb569e7a4faff9530a2d9aPatchThird Party Advisory
- https://medium.com/shapeshift-stories/keepkey-release-notes-v-6f7d2ec78065Third Party Advisory
- https://medium.com/shapeshift-stories/shapeshift-security-update-8ec89bb1b4e3Third Party Advisory
- https://blog.inhq.net/posts/keepkey-CVE-2019-18672/
- https://github.com/keepkey/keepkey-firmware/commit/769714fcb569e7a4faff9530a2d9aPatchThird Party Advisory
- https://medium.com/shapeshift-stories/keepkey-release-notes-v-6f7d2ec78065Third Party Advisory
- https://medium.com/shapeshift-stories/shapeshift-security-update-8ec89bb1b4e3Third Party Advisory
FAQ
What is CVE-2019-18672?
CVE-2019-18672 is a vulnerability with a CVSS score of 7.5 (HIGH). Insufficient checks in the finite state machine of the ShapeShift KeepKey hardware wallet before firmware 6.2.2 allow a partial reset of cryptographic secrets to known values via crafted messages. Not...
How severe is CVE-2019-18672?
CVE-2019-18672 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-18672?
Check the references section above for vendor advisories and patch information. Affected products include: Shapeshift Keepkey Firmware.