CVE-2023-25758

low-risk
Published 2023-02-14

Onekey Touch devices through 4.0.0 and Onekey Mini devices through 2.10.0 allow man-in-the-middle attackers to obtain the seed phase. The man-in-the-middle access can only be obtained after disassembling a device (i.e., here, "man-in-the-middle" does not refer to the attacker's position on an IP network). NOTE: the vendor states that "our hardware team has updated the security patch without anyone being affected."

Do I need to act?

-
0.09% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.2/10 Medium
PHYSICAL / HIGH complexity

Affected Products (2)

Onekey Touch Firmware
Onekey Mini Firmware

Affected Vendors

18
/ 100
low-risk
Severity 11/34 · Low
Exploitability 0/34 · Minimal
Exposure 7/34 · Low