Mend.io Vulnerability Database
The largest open source vulnerability database
What is a Vulnerability ID?
New vulnerability? Tell us about it!
CVE-2023-27892
May 02, 2023
Insufficient length checks in the ShapeShift KeepKey hardware wallet firmware before 7.7.0 allow a global buffer overflow via crafted messages. Flaws in cf_confirmExecTx() in ethereum_contracts.c can be used to reveal arbitrary microcontroller memory on the device screen or crash the device. With physical access to a PIN-unlocked device, attackers can extract the BIP39 mnemonic secret from the hardware wallet.
Do you need more information?
Contact Us
CVSS v4
Base Score:
4.1
Attack Vector
PHYSICAL
Attack Complexity
HIGH
Attack Requirements
NONE
Privileges Required
HIGH
User Interaction
NONE
Vulnerable System Confidentiality
HIGH
Vulnerable System Integrity
NONE
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
3.8
Attack Complexity
HIGH
Attack Vector
PHYSICAL
Availability
NONE
Confidentiality
HIGH
Integrity
NONE
Privileges Required
HIGH
Scope
UNCHANGED
User Interaction
NONE
Weakness Type (CWE)
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Out-of-bounds Read
EPSS
Base Score:
0.04