CVE-2025-69893

A side-channel vulnerability exists in the implementation of BIP-39 mnemonic processing, as observed in Trezor One v1.13.0 to v1.14.0, Trezor T v1.13.0 to v1.14.0, and Trezor Safe v1.13.0 to v1.14.0 hardware wallets. This originates from the BIP-39 standard guidelines, which induce non-constant time execution and specific branch patterns for word searching. An attacker with physical access during the initial setup phase can collect a single side-channel trace. By utilizing profiling-based Deep Learning Side-Channel Analysis (DL-SCA), the attacker can recover the mnemonic code and subsequently steal the assets. The issue was patched.
Configurations

No configuration.

History

16 Apr 2026, 13:16

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.6
CWE CWE-385

14 Apr 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-14 15:16

Updated : 2026-04-27 19:18


NVD link : CVE-2025-69893

Mitre link : CVE-2025-69893

CVE.ORG link : CVE-2025-69893


JSON object : View

Products Affected

No product.

CWE
CWE-385

Covert Timing Channel