The Cryptocurrency Post

Solana’s Saga Phone is Vulnerable to Critical Exploit, Certik Says

Solana's Saga Phone is Vulnerable to Critical Exploit, Certik Says

The exploit could “compromise the most sensitive data stored on the phone, including cryptocurrency private keys.”

Solana’s phone is vulnerable to an attack that can put any digital assets stored on it “at extreme risk,” according to an emailed statement by blockchain security firm Certik.

The vulnerability allows an attacker with physical access to a phone to load custom firmware containing a root backdoor, Certik said, adding that the exploit could “compromise the most sensitive data stored on the phone, including cryptocurrency private keys.”

Solana’s cel phone, which launched in April, is an Android device that was marketed as being “purpose-built for crypto.”

Solana Foundation didn’t immediately reply to a request for comment sent to its press email.

The exploit exposes any plaintext data stored on the device, including private keys.

Two key points of failure exist, according to Certik. First, the phone’s wallet depends only on the device’s operating system for security, and second, its “bootloader unlock” feature, which lets attackers install custom firmware. A hidden root backdoor allows the phone to operate as usual while being compromised.

The wallet app featured here is particularly insecure, falling into the S0 security level, which stores private keys and other sensitive information in plaintext, Certik said.

Solana Phone Risks


Source link

Exit mobile version