CVE-2023-25758

Onekey Touch devices through 4.0.0 and Onekey Mini devices through 2.10.0 allow man-in-the-middle attackers to obtain the seed phase. The man-in-the-middle access can only be obtained after disassembling a device (i.e., here, "man-in-the-middle" does not refer to the attacker's position on an IP network). NOTE: the vendor states that "our hardware team has updated the security patch without anyone being affected."
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:onekey:onekey_touch_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:onekey:onekey_touch:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:onekey:onekey_mini_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:onekey:onekey_mini:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-02-14 07:15

Updated : 2023-02-22 16:15


NVD link : CVE-2023-25758

Mitre link : CVE-2023-25758

CVE.ORG link : CVE-2023-25758


JSON object : View

Products Affected

onekey

  • onekey_mini
  • onekey_touch
  • onekey_mini_firmware
  • onekey_touch_firmware