Briefing

A significant vulnerability has been disclosed in Tangem cold wallet cards, enabling a “tearing attack” that bypasses PIN attempt limits. This flaw, identified by Ledger’s Donjon team, allows for accelerated brute-force attacks on the card’s PIN by interrupting power during failed attempts. While the attack requires physical proximity and specialized equipment, it drastically reduces the time needed to compromise a wallet, posing a direct threat to user asset security. The vulnerability is unpatchable on existing cards, highlighting a critical hardware-level security concern.

A macro perspective reveals a vibrant blue circuit board, intricately designed with numerous silver electronic components and prominent connector pins. At its core, a unique spherical structure composed of tangled blue and silver wires is prominently displayed, suggesting complex internal mechanisms

Context

Hardware wallets are designed to provide robust offline security for digital assets, often relying on physical tamper-detection and limited PIN attempts to prevent unauthorized access. The expectation is that such devices are resistant to physical brute-force methods. However, the discovery of this “tearing attack” reveals a previously unaddressed attack surface, challenging the fundamental security assumptions of certain cold storage designs and demonstrating that even physically secured devices can harbor subtle, exploitable flaws.

Blue faceted crystals, resembling intricate ice formations, are partially covered in white, powdery frost. The intricate blockchain architecture is visually represented by these crystalline structures, each facet symbolizing a validated block within a distributed ledger technology

Analysis

The incident centers on a physical “tearing attack” against Tangem cold wallet cards. The specific system compromised is the card’s internal security mechanism that registers failed PIN attempts. By physically cutting the card’s power supply precisely as a PIN attempt fails, the attacker prevents the card from recording the failed attempt, thereby circumventing the built-in attempt limits.

Simultaneously, electromagnetic emissions analysis is used to detect when a correct PIN combination is entered, streamlining the brute-force process. This chain of events allows an attacker with physical access to bypass the intended security measures and rapidly discover the user’s PIN, fundamentally undermining the card’s protection against unauthorized access.

The image displays a stylized scene featuring towering, jagged ice formations, glowing deep blue at their bases and stark white on top, set against a light grey background. A prominent metallic structure, resembling a server or hardware wallet, is integrated with the ice, surrounded by smaller icy spheres and white, cloud-like elements, all reflected on a calm water surface

Parameters

  • Targeted Hardware → Tangem Cold Wallet Cards
  • Attack VectorBrute Force via “Tearing Attack”
  • Vulnerability Type → PIN Attempt Limit Bypass
  • Discovery Source → Ledger’s Donjon Team
  • Estimated Attack Cost → $5,000
  • Estimated Time (8-digit PIN) → ~460 days (down from 148 years)
  • Patch Status → Unpatchable on existing cards
  • Disclosure Date → September 18, 2025

A vibrant blue, crystalline structure, appearing frozen and partially covered in white frost, dominates the center of the frame. A sleek, reflective blue ribbon partially encircles this frosty formation, with a single water droplet clinging to the central crystal

Outlook

Users of Tangem cards are advised to immediately strengthen their PINs to eight or more alphanumeric characters and symbols, as existing cards cannot be patched. This incident underscores the necessity for rigorous, adversarial physical security testing in hardware wallet design and the importance of multi-factor authentication beyond simple PINs. It will likely prompt a re-evaluation of certification standards for cold storage devices and emphasize the need for transparency in vulnerability disclosures across the digital asset security industry.

A translucent, frosted rectangular module displays two prominent metallic circular buttons, set against a dynamic backdrop of flowing blue and reflective silver elements. This sophisticated interface represents a critical component in secure digital asset management, likely a hardware wallet designed for cold storage of private keys

Verdict

This hardware-level vulnerability in Tangem cold wallets represents a significant, unpatchable flaw that necessitates immediate user action and a re-evaluation of physical security assumptions in the digital asset ecosystem.

Signal Acquired from → Protos

Micro Crypto News Feeds

asset security

Definition ∞ Asset Security refers to the measures and protocols implemented to safeguard digital assets against unauthorized access, theft, or loss.

security assumptions

Definition ∞ Security assumptions are fundamental premises or beliefs about the operational integrity and trustworthiness of a system or protocol, upon which its security design is predicated.

cold wallet

Definition ∞ A cold wallet is a cryptocurrency storage device or method that is kept offline, disconnected from the internet.

unauthorized access

Definition ∞ Unauthorized access describes the act of gaining entry to a digital system, network, or data without explicit permission or authorization.

wallet

Definition ∞ A digital wallet is a software or hardware application that stores public and private keys, enabling users to send, receive, and manage their digital assets on a blockchain.

brute force

Definition ∞ Brute Force refers to a trial-and-error method used to gain access to information or systems by systematically checking all possible combinations.

vulnerability

Definition ∞ A vulnerability refers to a flaw or weakness in a system, protocol, or smart contract that could be exploited by malicious actors to compromise its integrity, security, or functionality.

digital asset security

Definition ∞ Digital Asset Security refers to the measures and protocols implemented to protect digital assets from theft, loss, or unauthorized alteration.

digital asset

Definition ∞ A digital asset is a digital representation of value that can be owned, transferred, and traded.