2024-11-23 11:10:51 +00:00

131 lines
4.8 KiB
JSON

{
"id": "CVE-2019-14355",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-10T16:15:11.300",
"lastModified": "2024-11-21T04:26:34.633",
"vulnStatus": "Modified",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "On ShapeShift KeepKey devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover secret data shown on the display. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data. NOTE: the vendor's position is that there is \"insignificant risk."
},
{
"lang": "es",
"value": "**EN DISPUTA** En los dispositivos KeepKey de ShapeShift, se encontr\u00f3 un canal lateral para la pantalla OLED basada en filas. El consumo de energ\u00eda de cada ciclo de despliegue basado en filas depende del n\u00famero de p\u00edxeles iluminados, permitiendo una recuperaci\u00f3n parcial del contenido de la pantalla. Por ejemplo, un implante de hardware en el cable USB podr\u00eda aprovechar este comportamiento para recuperar datos secretos que se muestran en la pantalla. En otras palabras, el canal lateral es relevante solo si el atacante tiene suficiente control sobre la conexi\u00f3n USB del dispositivo para realizar mediciones de consumo de energ\u00eda en un momento en que los datos secretos son mostrados. El canal lateral no es relevante en otras circunstancias, como un dispositivo robado que actualmente no muestra datos secretos. NOTA: la posici\u00f3n del vendedor es que existe un \"riesgo insignificante\"."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 2.4,
"baseSeverity": "LOW",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"baseScore": 1.9,
"accessVector": "LOCAL",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:shapeshift:keepkey_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8279431A-90C6-4965-9BB1-A511D592D4FA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:shapeshift:keepkey:-:*:*:*:*:*:*:*",
"matchCriteriaId": "663CE48F-F657-40AA-8954-EADA31C9DFB1"
}
]
}
]
}
],
"references": [
{
"url": "https://medium.com/shapeshift-stories/shapeshift-security-update-5b0dd45c93db",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://medium.com/shapeshift-stories/shapeshift-security-update-5b0dd45c93db",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}