Ledger highlights five possible vulnerabilities in Trezor hardware wallets

Ledger has highlighted five possible vulnerabilities in Trezor's hardware wallet devices

Ledger, a leading hardware wallet developer, has taken aim at main competitor Trezor by posting a report highlighting five vulnerabilities in Trezor products.

Ledger uploaded a security report to its website claiming it believes it has a responsibility “to enhance security throughout the entire blockchain ecosystem whenever possible”.

In particular, Ledger has highlighted five vulnerabilities in Trezor products. Ledger claims to have contacted Trezor over the issues four months ago, stating: “We responsibly disclosed these vulnerabilities to the vendor, allowing them to take appropriate measures for protecting their users.

“Now that the responsible disclosure period, including two extensions, has expired, we wanted to share the details with you in spirit of full awareness and transparency.”

The Trezor models in question are the Trezor One and Trezor T.

Vulnerability 1

The first issue Ledger found related to the genuineness of the Trezor device – it claims they can be imitated. Ledger was able to manufacture fake devices.

Alongside this, it found that the Trezor product can be opened up, have a ‘backdoor’ inserted, and be re-sealed.

Vulnerability 2

The second vulnerability found by Ledger was in regard to the pin code. It found that it is possible to guess the value of the pin using a side channel attack.

A side channel attack consists of presenting a random pin number and then measuring the power consumption of the device when it compares the presented pin with the actual value of the pin.

Ledger claims to have cracked the pin in less than 5 attempts using this method.

Trezor has however patched this vulnerability in firmware update 1.8.0.

Vulnerabilities 3 and 4 

The third and fourth vulnerabilities apply to both the Trezor One and Trezor T. Ledger claims the confidentiality of the data inside of the devices is not secure.

It found that an attacker with physical access to the devices can extract all the data stored within the flash memory. Attackers can then deplete all assets from the user’s accounts.

Ledger does not believe this issue can be patched. It believes it can only be circumvented by overhauling the design to incorporate a Secure Element Chip. This would involve replacing a general purpose chip already implemented.

Vulnerability 5

Ledger also discovered that it could extract a private key using side channel attacks if the key uses Scalar Multiplication.

Scalar Multiplication is a core function in cryptography. In particular, Ledger notes it is the core function for signing transactions.

Utilising a digital oscilloscope alongside a few other measurements, Ledger was able to extract the key of a transaction using side channel analysis.

Ledger has reported this issue to Trezor – which can be patched – but also noted how it does not directly affect Trezor’s security model. This is because the operation cannot be triggered without knowing the device’s pin beforehand.

Trezor official statement

Trezor has released its official statement on the allegations.

The company claims that while Ledger did report and communicate with it over the suspected vulnerabilities, “some of the facts are represented differently”, which has led to “an alarmist interpretation of the vulnerabilities”.

Trezor has stated that supply chain attacks affect all hardware in transport and that there is no “100% solution”, as well as noting “all companies have different methods to mitigate this”.

The company claims that the side channel pin attack has been patched.

Trezor has also responded to the Scalar Multiplication allegation stating that it is “non-exploitable” since a pin is required.

It also comments on how “none of these attacks are exploitable remotely. All of the demonstrated attack vectors require physical access to the device, specialised equipment, time, and technical expertise”.

Interested in reading more about cryptocurrency wallets? Discover the pros and cons of the best crypto wallets available.

Disclaimer: The views and opinions expressed by the author should not be considered as financial advice. We do not give advice on financial products.

Previous Article

What is the Bancor Network?

Next Article

What is KYC and why is it necessary?

Read More Related articles