A side-channel vulnerability exists in the implementation of BIP-39 mnemonic processing, as observed in Trezor One v1.13.0 to v1.14.0, Trezor T v1.13.0 to v1.14.0, and Trezor Safe v1.13.0 to v1.14.0 hardware wallets. This originates from the BIP-39 standard guidelines, which induce non-constant time execution and specific branch patterns for word searching. An attacker with physical access during the initial setup phase can collect a single side-channel trace. By utilizing profiling-based Deep Learning Side-Channel Analysis (DL-SCA), the attacker can recover the mnemonic code and subsequently steal the assets. The issue was patched.
History

Sat, 18 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
Title Side-Channel Vulnerability in BIP-39 Mnemonic Processing on Trezor Wallets Enables Mnemonic Exposure

Fri, 17 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Title Side‑Channel Attack Enables Recovery of BIP‑39 Mnemonic on Trezor Wallets
Weaknesses CWE-128

Thu, 16 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-385
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Satoshilabs
Satoshilabs trezor One
Satoshilabs trezor Safe
Satoshilabs trezor T
Vendors & Products Satoshilabs
Satoshilabs trezor One
Satoshilabs trezor Safe
Satoshilabs trezor T

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title Side‑Channel Attack Enables Recovery of BIP‑39 Mnemonic on Trezor Wallets
Weaknesses CWE-128

Tue, 14 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description A side-channel vulnerability exists in the implementation of BIP-39 mnemonic processing, as observed in Trezor One v1.13.0 to v1.14.0, Trezor T v1.13.0 to v1.14.0, and Trezor Safe v1.13.0 to v1.14.0 hardware wallets. This originates from the BIP-39 standard guidelines, which induce non-constant time execution and specific branch patterns for word searching. An attacker with physical access during the initial setup phase can collect a single side-channel trace. By utilizing profiling-based Deep Learning Side-Channel Analysis (DL-SCA), the attacker can recover the mnemonic code and subsequently steal the assets. The issue was patched.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-04-14T00:00:00.000Z

Updated: 2026-04-16T12:06:31.722Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-69893

cve-icon Vulnrichment

Updated: 2026-04-16T11:38:24.667Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-14T15:16:25.357

Modified: 2026-04-17T15:24:57.753

Link: CVE-2025-69893

cve-icon Redhat

No data.