ID

VAR-201912-0677


CVE

CVE-2019-18671


TITLE

ShapeShift KeepKey hardware wallet Vulnerable to out-of-bounds writing

Trust: 0.8

sources: JVNDB: JVNDB-2019-013053

DESCRIPTION

Insufficient checks in the USB packet handling of the ShapeShift KeepKey hardware wallet before firmware 6.2.2 allow out-of-bounds writes in the .bss segment via crafted messages. The vulnerability could allow code execution or other forms of impact. It can be triggered by unauthenticated attackers and the interface is reachable via WebUSB. ShapeShift KeepKey hardware wallet Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ShapeShift KeepKey is an e-wallet device for cryptocurrency storage. ShapeShift KeepKey has an overflow overflow vulnerability. The vulnerability originates from a network system or product that incorrectly validates data boundaries when performing operations on memory, causing incorrect read and write operations to be performed on other associated memory locations. An attacker could use this vulnerability to cause a buffer overflow or heap overflow

Trust: 2.16

sources: NVD: CVE-2019-18671 // JVNDB: JVNDB-2019-013053 // CNVD: CNVD-2020-00491

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-00491

AFFECTED PRODUCTS

vendor:keepkeymodel:keepkeyscope:ltversion:6.2.2

Trust: 1.0

vendor:key hodlersmodel:keepkeyscope:ltversion:6.2.2

Trust: 0.8

vendor:shapeshiftmodel:keepkeyscope:ltversion:6.2.2

Trust: 0.6

sources: CNVD: CNVD-2020-00491 // JVNDB: JVNDB-2019-013053 // NVD: CVE-2019-18671

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-18671
value: CRITICAL

Trust: 1.0

NVD: CVE-2019-18671
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2020-00491
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201912-270
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2019-18671
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2020-00491
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-18671
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2019-18671
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-00491 // JVNDB: JVNDB-2019-013053 // CNNVD: CNNVD-201912-270 // NVD: CVE-2019-18671

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.8

sources: JVNDB: JVNDB-2019-013053 // NVD: CVE-2019-18671

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201912-270

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201912-270

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-013053

PATCH

title:board: factor out tiny_dispatchurl:https://github.com/keepkey/keepkey-firmware/commit/b222c66cdd7c3203d917c80ba615082d309d80c3

Trust: 0.8

title:Patch for ShapeShift KeepKey Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/195945

Trust: 0.6

title:ShapeShift KeepKey Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=105267

Trust: 0.6

sources: CNVD: CNVD-2020-00491 // JVNDB: JVNDB-2019-013053 // CNNVD: CNNVD-201912-270

EXTERNAL IDS

db:NVDid:CVE-2019-18671

Trust: 3.0

db:JVNDBid:JVNDB-2019-013053

Trust: 0.8

db:CNVDid:CNVD-2020-00491

Trust: 0.6

db:CNNVDid:CNNVD-201912-270

Trust: 0.6

sources: CNVD: CNVD-2020-00491 // JVNDB: JVNDB-2019-013053 // CNNVD: CNNVD-201912-270 // NVD: CVE-2019-18671

REFERENCES

url:https://medium.com/shapeshift-stories/keepkey-release-notes-v-6f7d2ec78065

Trust: 2.4

url:https://medium.com/shapeshift-stories/shapeshift-security-update-8ec89bb1b4e3

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-18671

Trust: 2.0

url:https://github.com/keepkey/keepkey-firmware/commit/b222c66cdd7c3203d917c80ba615082d309d80c3

Trust: 1.6

url:https://blog.inhq.net/posts/keepkey-cve-2019-18671/

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-18671

Trust: 0.8

sources: CNVD: CNVD-2020-00491 // JVNDB: JVNDB-2019-013053 // CNNVD: CNNVD-201912-270 // NVD: CVE-2019-18671

SOURCES

db:CNVDid:CNVD-2020-00491
db:JVNDBid:JVNDB-2019-013053
db:CNNVDid:CNNVD-201912-270
db:NVDid:CVE-2019-18671

LAST UPDATE DATE

2024-11-23T23:11:37.125000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-00491date:2020-01-03T00:00:00
db:JVNDBid:JVNDB-2019-013053date:2019-12-19T00:00:00
db:CNNVDid:CNNVD-201912-270date:2020-06-10T00:00:00
db:NVDid:CVE-2019-18671date:2024-11-21T04:33:29.950

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-00491date:2020-01-03T00:00:00
db:JVNDBid:JVNDB-2019-013053date:2019-12-19T00:00:00
db:CNNVDid:CNNVD-201912-270date:2019-12-06T00:00:00
db:NVDid:CVE-2019-18671date:2019-12-06T18:15:12.653