Onekey Touch devices through 4.0.0 and Onekey Mini devices through 2.10.0 allow man-in-the-middle attackers to obtain the seed phase. The man-in-the-middle access can only be obtained after disassembling a device (i.e., here, "man-in-the-middle" does not refer to the attacker's position on an IP network). NOTE: the vendor states that "our hardware team has updated the security patch without anyone being affected."
References
Configurations
History
21 Nov 2024, 07:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://blog.onekey.so/our-response-to-recent-security-fix-reports-13914fea8afd - Vendor Advisory | |
References | () https://fortune.com/crypto/2023/02/09/cyber-firm-cracks-onekey-crypto-wallets-in-video-raises-questions-hardware-security/amp/ - Third Party Advisory | |
References | () https://github.com/OneKeyHQ/firmware - Product |
22 Feb 2023, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-02-14 07:15
Updated : 2025-03-20 19:15
NVD link : CVE-2023-25758
Mitre link : CVE-2023-25758
CVE.ORG link : CVE-2023-25758
JSON object : View
Products Affected
onekey
- onekey_mini_firmware
- onekey_touch_firmware
- onekey_touch
- onekey_mini
CWE