Cryptocurrency hardware maker Ledger has acknowledged a report detailing a vulnerability in its product.
The issue was detailed in an anonymous report, which Ledger acknowledged in a tweet.
The vulnerability allows hackers to manipulate Ledger’s software by accessing the files on a device.
By manipulating these files, attackers can inject their own receive address onto the host machine, causing funds to be sent to an attacker.
It must be noted that this attack cannot compromise your private keys.