On September 19th, 2019 we released an update to KeepKey’s firmware. Firmware version 6.2.2 contains fixes for 9 different vulnerabilities that were reported by researcher Christian Reitter via ShapeShift’s Responsible Disclosure Program. Two of these vulnerabilities are described in the following CVEs:

  • CVE-2019–18671 — USB Packet Handling Bug could allow out-of-bound writes in device memory.
  • CVE-2019–18672 — Mnemonic Wipe Bug could allow the mnemonic seed to be wiped from a KeepKey, causing the device to derive addresses from the well-known “null” mnemonic seed and U2F websites to fail to authenticate.

You can read more details about the two vulnerabilities on MITRE’s website once they’re fully published. All 9 vulnerabilities were fixed in KeepKey Firmware 6.2.2 which was released on September 19th, 2019.

Update to KeepKey Firmware 6.2.2

In the meantime, to ensure KeepKey can keep your coins as safe as possible, always make sure you’re using the latest version of KeepKey’s firmware. Instructions for doing this are available on our website.

Our Responsible Disclosure Program

If you’re a security researcher who has found what you believe to be a bug or vulnerability in any of ShapeShift’s products or services, don’t hesitate to submit it to ShapeShift’s Security Team via our Responsible Disclosure Program.