Home

Description

Ledger Bitcoin app versions 2.1.0 and 2.1.1 contain an address derivation vulnerability that allows attackers to cause incorrect Bitcoin addresses to be displayed by exploiting improper handling of miniscript policies containing the a: fragment. Attackers can craft malicious miniscript policies that cause the device to derive and display incorrect receiving addresses, potentially leading to funds being sent to unintended addresses.

PUBLISHED Reserved 2026-05-20 | Published 2026-05-20 | Updated 2026-05-20 | Assigner VulnCheck




MEDIUM: 4.0CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N

MEDIUM: 4.1CVSS:4.0/AV:P/AC:H/AT:P/PR:N/UI:A/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-682 Incorrect Calculation

Product status

Default status
unaffected

2.1.0 (semver)
affected

2.1.1 (semver)
affected

2.1.2 (semver)
unaffected

Credits

Kevin Loaec finder

Antoine Poinsot finder

VulnCheck coordinator

References

donjon.ledger.com/lsb/019/ (Ledger Security Bulletin 019) vendor-advisory

www.vulncheck.com/...address-derivation-error-via-miniscript third-party-advisory

cve.org (CVE-2023-7346)

nvd.nist.gov (CVE-2023-7346)

Download JSON