CVE-2023-25758
Published Feb 14, 2023
Last updated 2 years ago
Overview
- Description
- Onekey Touch devices through 4.0.0 and Onekey Mini devices through 2.10.0 allow man-in-the-middle attackers to obtain the seed phase. The man-in-the-middle access can only be obtained after disassembling a device (i.e., here, "man-in-the-middle" does not refer to the attacker's position on an IP network). NOTE: the vendor states that "our hardware team has updated the security patch without anyone being affected."
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 4.2
- Impact score
- 3.6
- Exploitability score
- 0.5
- Vector string
- CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:onekey:onekey_touch_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77C734E7-88DC-4748-BFFD-89B3ABF4BC44", "versionEndIncluding": "4.0.0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:onekey:onekey_touch:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6673C385-D5A1-4716-802F-86F888A26671" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:onekey:onekey_mini_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24235185-9002-43B9-9D58-CADA9F638C6B", "versionEndIncluding": "2.10.0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:onekey:onekey_mini:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "11FA4596-E060-4C8B-B50D-DD7C6063C177" } ], "operator": "OR" } ], "operator": "AND" } ]