CVE-2025-15645
Description
Ledger Nano X, Flex, and Stax devices contain a denial of service vulnerability in the MCU firmware update process due to missing validation of the reset_handler parameter during firmware flashing. An attacker can provide a crafted reset_handler address pointing to invalid memory or attacker-controlled code to cause the device to enter an unrecoverable fault state during boot, resulting in permanent loss of operability.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Ledger Nano X, Flex, and Stax devices are vulnerable to permanent bricking via an unvalidated reset_handler parameter during MCU firmware update.
Vulnerability
A denial-of-service vulnerability exists in the MCU firmware update process of Ledger Nano X, Flex, and Stax devices. During a firmware update, the bootloader expects the host to provide a reset_handler address that determines where execution resumes after flashing completes. The bootloader does not validate this address. An attacker can supply a crafted reset_handler value pointing to invalid or non-executable memory, causing an unrecoverable fault during boot. Affected versions include Nano X < 2.4.2, Flex < 1.2.2, and Stax < 1.6.2 [1][2].
Exploitation
An attacker must be in a position to deliver a malicious firmware update to the device. This requires physical access to the device or the ability to intercept and modify the firmware update process (e.g., via a compromised host computer or a malicious update mechanism). The attacker crafts a firmware image where the reset_handler parameter points to an invalid or attacker-controlled memory region. When the device reboots after flashing, the invalid address causes a crash or fault, permanently bricking the device [1].
Impact
Successful exploitation results in a permanent denial of service: the device enters a fault state during boot, both external interfaces become unresponsive, and the device cannot be restored without specialized tools and factory-level access. Client funds are never at risk; the impact is limited to device operability [1][2].
Mitigation
The vulnerability is fixed by enforcing strict validation of the reset_handler field during firmware updates. The fix is included in Nano X >= 2.4.2, Flex >= 1.2.2, Stax >= 1.6.2 and all later firmware releases. Users should update their device firmware to the latest available version. No workaround is available [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
3Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.