CVE-2019-14355

On ShapeShift KeepKey devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover secret data shown on the display. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data. NOTE: the vendor's position is that there is "insignificant risk.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:shapeshift:keepkey_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:shapeshift:keepkey:-:*:*:*:*:*:*:*

History

07 Nov 2023, 03:04

Type Values Removed Values Added
CWE CWE-200 CWE-203
Summary ** DISPUTED ** On ShapeShift KeepKey devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover secret data shown on the display. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data. NOTE: the vendor's position is that there is "insignificant risk." On ShapeShift KeepKey devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover secret data shown on the display. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data. NOTE: the vendor's position is that there is "insignificant risk.

Information

Published : 2019-08-10 16:15

Updated : 2024-05-17 01:33


NVD link : CVE-2019-14355

Mitre link : CVE-2019-14355

CVE.ORG link : CVE-2019-14355


JSON object : View

Products Affected

shapeshift

  • keepkey
  • keepkey_firmware
CWE
CWE-203

Observable Discrepancy