CVE-2022-30330

CVE-2022-30330

In the KeepKey firmware before 7.3.2, the bootloader can be exploited in unusual situations in which the attacker has physical access, convinces the victim to install malicious firmware, or knows the victim’s seed phrase. lib/board/supervise.c mishandles svhandler_flash_* address range checks. If exploited, any installed malware could persist even after wiping the device and resetting the firmware.

Source: CVE-2022-30330

답글 남기기

이메일 주소는 공개되지 않습니다. 필수 필드는 *로 표시됩니다