CVE-2019-15947
moderate-risk
Published 2019-09-05
In Bitcoin Core 0.18.0, bitcoin-qt stores wallet.dat data unencrypted in memory. Upon a crash, it may dump a core file. If a user were to mishandle a core file, an attacker can reconstruct the user's wallet.dat file, including their private keys, via a grep "6231 0500" command.
Do I need to act?
-
0.35% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (8)
Third Party Advisory
https://gist.github.com/oxagast/50a121b2df32186e0c48411859d5861b
Issue Tracking
https://github.com/bitcoin/bitcoin/issues/16824
Third Party Advisory
https://security.gentoo.org/glsa/202009-18
Third Party Advisory
https://gist.github.com/oxagast/50a121b2df32186e0c48411859d5861b
Issue Tracking
https://github.com/bitcoin/bitcoin/issues/16824
Third Party Advisory
https://security.gentoo.org/glsa/202009-18
32
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal