In the KeepKey firmware before 7.3.2,Flaws in the supervisor interface can be exploited to bypass important security restrictions on firmware operations. Using these flaws, malicious firmware code can elevate privileges, permanently make the device inoperable or overwrite the trusted bootloader code to compromise the hardware wallet across reboots or storage wipes.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-52274 In the KeepKey firmware before 7.3.2, the bootloader can be exploited in unusual situations in which the attacker has physical access, convinces the victim to install malicious firmware, or knows the victim's seed phrase. lib/board/supervise.c mishandles svhandler_flash_* address range checks. If exploited, any installed malware could persist even after wiping the device and resetting the firmware.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T06:48:35.769Z

Reserved: 2022-05-07T00:00:00

Link: CVE-2022-30330

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-07T04:15:09.253

Modified: 2024-11-21T07:02:36.110

Link: CVE-2022-30330

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.