{ "id": "CVE-2023-25758", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-14T07:15:11.983", "lastModified": "2023-02-22T16:15:28.433", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Onekey Touch devices through 4.0.0 and Onekey Mini devices through 2.10.0 allow man-in-the-middle attackers to obtain the seed phase. The man-in-the-middle access can only be obtained after disassembling a device (i.e., here, \"man-in-the-middle\" does not refer to the attacker's position on an IP network). NOTE: the vendor states that \"our hardware team has updated the security patch without anyone being affected.\"" } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "attackVector": "PHYSICAL", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 4.2, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 0.5, "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ], "configurations": [ { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:onekey:onekey_touch_firmware:*:*:*:*:*:*:*:*", "versionEndIncluding": "4.0.0", "matchCriteriaId": "77C734E7-88DC-4748-BFFD-89B3ABF4BC44" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:onekey:onekey_touch:-:*:*:*:*:*:*:*", "matchCriteriaId": "6673C385-D5A1-4716-802F-86F888A26671" } ] } ] }, { "operator": "AND", "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:onekey:onekey_mini_firmware:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.10.0", "matchCriteriaId": "24235185-9002-43B9-9D58-CADA9F638C6B" } ] }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": false, "criteria": "cpe:2.3:h:onekey:onekey_mini:-:*:*:*:*:*:*:*", "matchCriteriaId": "11FA4596-E060-4C8B-B50D-DD7C6063C177" } ] } ] } ], "references": [ { "url": "https://blog.onekey.so/our-response-to-recent-security-fix-reports-13914fea8afd", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "https://fortune.com/crypto/2023/02/09/cyber-firm-cracks-onekey-crypto-wallets-in-video-raises-questions-hardware-security/amp/", "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ] }, { "url": "https://github.com/OneKeyHQ/firmware", "source": "cve@mitre.org", "tags": [ "Product" ] } ] }