CVE-2025-52294

5.7 MEDIUM

📋 TL;DR

This vulnerability allows physically proximate attackers to bypass the screen lock mechanism in Trust Wallet v8.45 and view wallet balances without authentication. It affects mobile users who have the vulnerable version installed and leave their devices unattended. The attack requires physical access to the device.

💻 Affected Systems

Products:
  • Trust Wallet
Versions: v8.45
Operating Systems: Android, iOS
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of Trust Wallet v8.45 are vulnerable regardless of configuration settings.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains unauthorized access to view cryptocurrency balances and potentially initiate transactions if other authentication mechanisms are also bypassed.

🟠

Likely Case

Unauthorized viewing of wallet balances, exposing financial information and potentially enabling social engineering or targeted attacks.

🟢

If Mitigated

Limited information disclosure with no transaction capability if proper PIN/biometric authentication remains intact for transactions.

🌐 Internet-Facing: LOW - This is a local physical access vulnerability, not remotely exploitable.
🏢 Internal Only: MEDIUM - Requires physical proximity but could be exploited by insiders or in shared spaces.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The exploit requires physical device access and specific timing/sequence to bypass screen lock. Technical details are publicly available in the reference link.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v8.46 or later

Vendor Advisory: https://pastebin.com/3K4kt713

Restart Required: No

Instructions:

1. Open your device's app store (Google Play Store or Apple App Store). 2. Search for Trust Wallet. 3. If an update is available, tap Update. 4. Ensure version is 8.46 or higher.

🔧 Temporary Workarounds

Enable Additional Authentication

all

Enable biometric authentication (fingerprint/face ID) in addition to screen lock for wallet access.

Physical Security Controls

all

Never leave device unattended in public spaces, enable auto-lock with short timeout, use device encryption.

🧯 If You Can't Patch

  • Uninstall Trust Wallet v8.45 and use alternative wallet software
  • Keep device physically secured at all times and never leave unattended

🔍 How to Verify

Check if Vulnerable:

Open Trust Wallet, go to Settings > About, check if version is exactly 8.45.

Check Version:

Not applicable - check version in app settings

Verify Fix Applied:

Update to version 8.46 or higher via app store, then verify screen lock properly prevents unauthorized access.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed screen lock attempts followed by successful wallet access
  • Unusual wallet access patterns without authentication events

Network Indicators:

  • None - this is a local physical vulnerability

SIEM Query:

Not applicable for this local physical access vulnerability

🔗 References

📤 Share & Export