Description
The Tillitis TKey signer device application is an ed25519 signing tool. A vulnerability has been found that makes it possible to disclose portions of the TKey’s data in RAM over the USB interface. To exploit the vulnerability an attacker needs to use a custom client application and to touch the TKey. No secret is disclosed. All client applications integrating tkey-device-signer should upgrade to version 1.0.0 to receive a fix. No known workarounds are available.
References (2)
Core 2
Core References
Vendor Advisory x_refsource_confirm
https://github.com/tillitis/tkey-device-signer/security/advisories/GHSA-frqc-62hv-379p
Various Sources x_refsource_misc
https://bugbounty.tillitis.se/security-bulletins/tillitis-security-bulletin-240115-1
Scores
CVSS v3
2.2
EPSS
0.0002
EPSS Percentile
6.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-125
CWE-367
Status
published
Products (1)
tillitis/tkey-device-signer
< 1.0.0
Published
Apr 23, 2024
Tracked Since
Feb 18, 2026