Archos Safe-T devices Information Exposure Vulnerability

Summary

On Archos Safe-T devices, a side channel for the row-based OLED display was found. The power consumption of each row-based display cycle depends on the number of illuminated pixels, allowing a partial recovery of display contents. For example, a hardware implant in the USB cable might be able to leverage this behavior to recover confidential secrets such as the PIN and BIP39 mnemonic. 

 

 

 

Credit:

The information has been provided by Vendor

The original article can be found at:https://blog.inhq.net/posts/oled-side-channel-status-summary/

 


Details

The side channel is relevant only if the attacker has enough control over the device’s USB connection to make power-consumption measurements at a time when secret data is displayed. The side channel is not relevant in other circumstances, such as a stolen device that is not currently displaying secret data.

 

Vulnerable Systems:

 Archos Safe-T devices 

 

CVE Information:

CVE-2019-14358

 

Disclosure Timeline:
Published Date: 11/02/2019