Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2019-18672 : Vulnerability Insights and Analysis

Learn about CVE-2019-18672, a vulnerability in ShapeShift KeepKey hardware wallet before firmware 6.2.2 allowing unauthorized access via WebUSB. Find out the impact, affected systems, exploitation mechanism, and mitigation steps.

Before firmware version 6.2.2, ShapeShift KeepKey hardware wallet had a vulnerability that allowed unauthorized access through WebUSB.

Understanding CVE-2019-18672

This CVE describes a security vulnerability in the ShapeShift KeepKey hardware wallet before firmware version 6.2.2.

What is CVE-2019-18672?

        Insufficient checks in the finite state machine of the ShapeShift KeepKey hardware wallet before firmware 6.2.2 allowed a partial reset of cryptographic secrets to known values via crafted messages.
        This vulnerability compromised the security of U2F for new server registrations and invalidated existing registrations.
        Unauthorized attackers could exploit this vulnerability to access the interface through WebUSB.

The Impact of CVE-2019-18672

        The vulnerability enabled attackers to manipulate messages to reset cryptographic secrets, compromising the security of U2F registrations.
        Unauthorized access through WebUSB could lead to potential security breaches and unauthorized access to the hardware wallet.

Technical Details of CVE-2019-18672

This section provides technical details of the CVE-2019-18672 vulnerability.

Vulnerability Description

        Lack of thorough verifications in the ShapeShift KeepKey hardware wallet's finite state machine before firmware version 6.2.2.
        Incomplete reset of cryptographic secrets through carefully manipulated messages.
        Compromises the security of U2F during new server registrations and invalidates existing registrations.

Affected Systems and Versions

        Product: ShapeShift KeepKey hardware wallet
        Vendor: ShapeShift
        Versions affected: Before firmware version 6.2.2

Exploitation Mechanism

        Attackers could exploit the vulnerability by sending carefully crafted messages to the hardware wallet, enabling unauthorized access through WebUSB.

Mitigation and Prevention

Protecting against CVE-2019-18672 requires immediate steps and long-term security practices.

Immediate Steps to Take

        Update the firmware of the ShapeShift KeepKey hardware wallet to version 6.2.2 or newer.
        Avoid connecting the hardware wallet to untrusted devices or networks.
        Monitor for any unauthorized access or unusual activity on the device.

Long-Term Security Practices

        Regularly update firmware and security patches for the hardware wallet.
        Educate users on safe practices for using hardware wallets and avoiding potential security risks.

Patching and Updates

        ShapeShift released firmware version 6.2.2 to address the vulnerability.
        Users should promptly update their hardware wallets to the latest firmware version to mitigate the risk of exploitation.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now