A side-channel vulnerability exists in the implementation of BIP-39 mnemonic processing, as observed in Trezor One v1.13.0 to v1.14.0, Trezor T v1.13.0 to v1.14.0, and Trezor Safe v1.13.0 to v1.14.0 hardware wallets. This originates from the BIP-39 standard guidelines, which induce non-constant time execution and specific branch patterns for word searching. An attacker with physical access during the initial setup phase can collect a single side-channel trace. By utilizing profiling-based Deep Learning Side-Channel Analysis (DL-SCA), the attacker can recover the mnemonic code and subsequently steal the assets. The issue was patched.
History

Tue, 14 Apr 2026 16:45:00 +0000

Type Values Removed Values Added
Title Side‑Channel Attack Enables Recovery of BIP‑39 Mnemonic on Trezor Wallets
Weaknesses CWE-128

Tue, 14 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description A side-channel vulnerability exists in the implementation of BIP-39 mnemonic processing, as observed in Trezor One v1.13.0 to v1.14.0, Trezor T v1.13.0 to v1.14.0, and Trezor Safe v1.13.0 to v1.14.0 hardware wallets. This originates from the BIP-39 standard guidelines, which induce non-constant time execution and specific branch patterns for word searching. An attacker with physical access during the initial setup phase can collect a single side-channel trace. By utilizing profiling-based Deep Learning Side-Channel Analysis (DL-SCA), the attacker can recover the mnemonic code and subsequently steal the assets. The issue was patched.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-14T14:31:18.915Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-69893

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-14T15:16:25.357

Modified: 2026-04-14T15:16:25.357

Link: CVE-2025-69893

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:37:18Z