{"id":62980,"date":"2022-06-16T10:35:44","date_gmt":"2022-06-16T07:35:44","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=62980"},"modified":"2025-09-05T21:16:43","modified_gmt":"2025-09-05T18:16:43","slug":"vulnerability-found-in-older-versions-of-the-metamask-wallet","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/vulnerability-found-in-older-versions-of-the-metamask-wallet\/","title":{"rendered":"Vulnerability found in older versions of the MetaMask wallet"},"content":{"rendered":"<p>Security researchers from Halborn discovered a vulnerability affecting most browser wallets, including MetaMask. The issue affects a small segment of users.<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Security researchers at <a href=\"https:\/\/twitter.com\/HalbornSecurity?ref_src=twsrc%5Etfw\">@HalbornSecurity<\/a> have disclosed a wallet vulnerability that affects a small segment of users across many browser-based wallets, including MetaMask.<a href=\"https:\/\/t.co\/2tBl8BfISA\">https:\/\/t.co\/2tBl8BfISA<\/a><\/p>\n<p>1\/ \ud83e\uddf5<\/p>\n<p>\u2014 MetaMask \ud83e\udd8a\ud83d\udc99 (@MetaMask) <a href=\"https:\/\/twitter.com\/MetaMask\/status\/1537103629613551624?ref_src=twsrc%5Etfw\">June 15, 2022<\/a><\/p><\/blockquote>\n<p> <script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Experts disclosed a case in which, under certain conditions, the recovery seed phrase used by web wallets could be retrieved from the disk of a compromised computer.<\/p>\n<p>Developers fixed the vulnerability in MetaMask Extension version 10.11.3.<\/p>\n<p>However they warned that users may be at risk who meet the following conditions:<\/p>\n<ul class=\"wp-block-list\">\n<li>the hard drive was not encrypted;<\/li>\n<li>the recovery phrase was imported on a device not belonging to the user or the computer was compromised;<\/li>\n<li>the &#8216;Show recovery seed phrase&#8217; checkbox was used to display the text on the screen (image below).<\/li>\n<\/ul>\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh6.googleusercontent.com\/0ZH66gfHdDcCnTeuBRjRPw5rvPp65vKuh8U6Z2W7cYPDKyu0Ie0cswlmVbi8APOs97jlq92GZSlZfOIvhJGtuik6Z4l2imc1QTAhJqW-r9UC35FyowlLKfRNTTqhjPWBnqDXg6CHQPLsMyrkoQ\" alt=\"Vulnerability found in older versions of the MetaMask wallet\"\/><figcaption>Source: MetaMask.<\/figcaption><\/figure>\n<p>The MetaMask team noted that the vulnerability stems from browsers not treating physical-access attacks as threats and from all text inputs being kept in the device&#8217;s memory. The risk can be fully eliminated only with full disk encryption.<\/p>\n<p>Among other recommendations from the developers: clearing the browser cache and antivirus protection for the computer.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;Neither the wallet nor the software can protect themselves if the system in which they operate is compromised,&#8221; they noted.<\/p>\n<\/blockquote>\n<p>Halborn received a reward of $50,000 for disclosing the vulnerability.<\/p>\n<p>As reported in June 2022, the MetaMask team <a href=\"https:\/\/forklog.com\/en\/news\/metamask-developers-launch-bounty-program-in-partnership-with-hackerone\">launched a bug bounty program<\/a> in partnership with the HackerOne platform.<\/p>\n<p>Read ForkLog&#8217;s Bitcoin news on our <a href=\"https:\/\/telegram.me\/forklog\" target=\"_blank\" rel=\"nofollow noopener\">Telegram<\/a> \u2014 cryptocurrency news, prices and analytics.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers from Halborn discovered a vulnerability affecting most browser wallets, including MetaMask. The issue affects a small segment of users.<\/p>\n","protected":false},"author":1,"featured_media":62981,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1301,1287,57],"class_list":["post-62980","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-blockchain-vulnerabilities","tag-metamask","tag-wallets"],"aioseo_notices":[],"amp_enabled":true,"views":"38","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/62980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=62980"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/62980\/revisions"}],"predecessor-version":[{"id":62982,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/62980\/revisions\/62982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/62981"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=62980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=62980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=62980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}