NVD Vulnerability Detail
Search Exploit, PoC
CVE-2019-14356
Summary

On Coldcard MK1 and MK2 devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data. On Coldcard MK1 and MK2 devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. In other words, the side channel is relevant only if the attacker has enough control over the device's USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data. NOTE: At Coinkite, we’ve already mitigated it, even though we feel strongly that it is not a legitimate issue. In our opinion, it is both unproven (might not even work) and also completely impractical—even if it could be made to work perfectly

Publication Date Nov. 1, 2019, 3:15 a.m.
Registration Date Jan. 26, 2021, 11:39 a.m.
Last Update Nov. 21, 2024, 1:26 p.m.
CVSS3.1 : MEDIUM
スコア 5.3
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR) 不要
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C)
完全性への影響(I) なし
可用性への影響(A) なし
CVSS2.0 : MEDIUM
Score 5.0
Vector AV:N/AC:L/Au:N/C:P/I:N/A:N
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃前の認証要否(Au) 不要
機密性への影響(C)
完全性への影響(I) なし
可用性への影響(A) なし
Get all privileges. いいえ
Get user privileges いいえ
Get other privileges いいえ
User operation required いいえ
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:coinkite:coldcard_mk1_firmware:*:*:*:*:*:*:*:* 2.1.2
execution environment
1 cpe:2.3:h:coinkite:coldcard_mk1:-:*:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:o:coinkite:coldcard_mk2_firmware:*:*:*:*:*:*:*:* 2.1.2
execution environment
1 cpe:2.3:h:coinkite:coldcard_mk2:-:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
Coldcard MK1 および MK2 デバイスにおける情報漏えいに関する脆弱性
Title Coldcard MK1 および MK2 デバイスにおける情報漏えいに関する脆弱性
Summary

** 未確定 ** 本件は、脆弱性として確定していません。 Coldcard MK1 および MK2 デバイスには、情報漏えいに関する脆弱性が存在します。 ベンダは、本脆弱性に対して異議を唱えています。 詳細については、以下の NVD の Current Description を確認してください。 https://nvd.nist.gov/vuln/detail/CVE-2019-14356

Possible impacts 情報を取得される可能性があります。
Solution

ベンダ情報および参考情報を参照して適切な対策を実施してください。

Publication Date Oct. 31, 2019, midnight
Registration Date Nov. 12, 2019, 4:26 p.m.
Last Update Nov. 12, 2019, 4:26 p.m.
Affected System
Coinkite Inc.
Coldcard MK1 ファームウェア 
Coldcard MK2 ファームウェア 
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2019年11月12日]
  掲載
Nov. 12, 2019, 4:26 p.m.