Briefing

A significant vulnerability has been disclosed in Tangem cold wallet cards, enabling a “tearing attack” that bypasses PIN attempt limits. This flaw, identified by Ledger’s Donjon team, allows for accelerated brute-force attacks on the card’s PIN by interrupting power during failed attempts. While the attack requires physical proximity and specialized equipment, it drastically reduces the time needed to compromise a wallet, posing a direct threat to user asset security. The vulnerability is unpatchable on existing cards, highlighting a critical hardware-level security concern.

The image displays a high-fidelity rendering of a transparent device, revealing complex internal blue components and a prominent brushed metal surface. The device's outer shell is clear, showcasing the intricate design of its inner workings

Context

Hardware wallets are designed to provide robust offline security for digital assets, often relying on physical tamper-detection and limited PIN attempts to prevent unauthorized access. The expectation is that such devices are resistant to physical brute-force methods. However, the discovery of this “tearing attack” reveals a previously unaddressed attack surface, challenging the fundamental security assumptions of certain cold storage designs and demonstrating that even physically secured devices can harbor subtle, exploitable flaws.

The image showcases a high-precision hardware component, featuring a prominent brushed metal cylinder partially enveloped by a translucent blue casing. Below this, a dark, wavy-edged interface is meticulously framed by polished metallic accents, set against a muted grey background

Analysis

The incident centers on a physical “tearing attack” against Tangem cold wallet cards. The specific system compromised is the card’s internal security mechanism that registers failed PIN attempts. By physically cutting the card’s power supply precisely as a PIN attempt fails, the attacker prevents the card from recording the failed attempt, thereby circumventing the built-in attempt limits.

Simultaneously, electromagnetic emissions analysis is used to detect when a correct PIN combination is entered, streamlining the brute-force process. This chain of events allows an attacker with physical access to bypass the intended security measures and rapidly discover the user’s PIN, fundamentally undermining the card’s protection against unauthorized access.

A futuristic, modular white satellite-like structure with solar panels propels a vigorous stream of frothy blue water into a cloudy, watery expanse. This central aperture serves as a symbolic protocol gateway, channeling immense data availability or liquidity flow

Parameters

  • Targeted Hardware → Tangem Cold Wallet Cards
  • Attack VectorBrute Force via “Tearing Attack”
  • Vulnerability Type → PIN Attempt Limit Bypass
  • Discovery Source → Ledger’s Donjon Team
  • Estimated Attack Cost → $5,000
  • Estimated Time (8-digit PIN) → ~460 days (down from 148 years)
  • Patch Status → Unpatchable on existing cards
  • Disclosure Date → September 18, 2025

The image presents two segmented, white metallic cylindrical structures, partially encased in a translucent, light blue, ice-like substance. A brilliant, starburst-like blue energy discharge emanates from the gap between these two components, surrounded by small radiating particles

Outlook

Users of Tangem cards are advised to immediately strengthen their PINs to eight or more alphanumeric characters and symbols, as existing cards cannot be patched. This incident underscores the necessity for rigorous, adversarial physical security testing in hardware wallet design and the importance of multi-factor authentication beyond simple PINs. It will likely prompt a re-evaluation of certification standards for cold storage devices and emphasize the need for transparency in vulnerability disclosures across the digital asset security industry.

The image displays a detailed view of a futuristic device, highlighting a circular port filled with illuminated blue crystalline elements and surrounded by white, frosty material. Modular white and dark grey components make up the device's exterior, suggesting complex internal mechanisms

Verdict

This hardware-level vulnerability in Tangem cold wallets represents a significant, unpatchable flaw that necessitates immediate user action and a re-evaluation of physical security assumptions in the digital asset ecosystem.

Signal Acquired from → Protos

Micro Crypto News Feeds

asset security

Definition ∞ Asset Security refers to the measures and protocols implemented to safeguard digital assets against unauthorized access, theft, or loss.

security assumptions

Definition ∞ Security assumptions are fundamental premises or beliefs about the operational integrity and trustworthiness of a system or protocol, upon which its security design is predicated.

cold wallet

Definition ∞ A cold wallet is a cryptocurrency storage device or method that is kept offline, disconnected from the internet.

unauthorized access

Definition ∞ Unauthorized access describes the act of gaining entry to a digital system, network, or data without explicit permission or authorization.

wallet

Definition ∞ A digital wallet is a software or hardware application that stores public and private keys, enabling users to send, receive, and manage their digital assets on a blockchain.

brute force

Definition ∞ Brute Force refers to a trial-and-error method used to gain access to information or systems by systematically checking all possible combinations.

vulnerability

Definition ∞ A vulnerability refers to a flaw or weakness in a system, protocol, or smart contract that could be exploited by malicious actors to compromise its integrity, security, or functionality.

digital asset security

Definition ∞ Digital Asset Security refers to the measures and protocols implemented to protect digital assets from theft, loss, or unauthorized alteration.

digital asset

Definition ∞ A digital asset is a digital representation of value that can be owned, transferred, and traded.