Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
4.6
Trezor Wallets: Physical Access Can Reveal Secret Mnemonic Code
CVE-2025-69893
Summary
Vulnerable Trezor wallets can leak sensitive information if an attacker has physical access during setup. This allows the attacker to steal assets. Update to the latest patched version to fix the issue.
Original title
A side-channel vulnerability exists in the implementation of BIP-39 mnemonic processing, as observed in Trezor One v1.13.0 to v1.14.0, Trezor T v1.13.0 to v1.14.0, and Trezor Safe v1.13.0 to v1.14....
Original description
A side-channel vulnerability exists in the implementation of BIP-39 mnemonic processing, as observed in Trezor One v1.13.0 to v1.14.0, Trezor T v1.13.0 to v1.14.0, and Trezor Safe v1.13.0 to v1.14.0 hardware wallets. This originates from the BIP-39 standard guidelines, which induce non-constant time execution and specific branch patterns for word searching. An attacker with physical access during the initial setup phase can collect a single side-channel trace. By utilizing profiling-based Deep Learning Side-Channel Analysis (DL-SCA), the attacker can recover the mnemonic code and subsequently steal the assets. The issue was patched.
Vulnerability type
CWE-385
Published: 14 Apr 2026 · Updated: 16 Apr 2026 · First seen: 14 Apr 2026