"Jade devices running firmware version 1.0.24 to 1.0.36 can be crashed by a malformed RPC request, leading to a device reboot. Jade devices contain stack protection code that attempts to prevent overwriting of the stack, and triggering this code will cause the device to reboot.
On firmware versions 1.0.24 to 1.0.35, a sophisticated attacker can potentially construct an RPC request that bypasses Jade's stack protection, leading to limited code execution. Version 1.0.36 is not yet known to be vulnerable, but this cannot be ruled out.
If an attacker is able to execute a malicious request, they may change the running software until device reboot. Additionally, they may potentially read and write the device's internal storage and send RPC messages to the host device. This means that the severity of any future exploit based on this vulnerability ranges from griefing the user by destroying stored data, to potentially extracting the user's secret key and returning it via RPC reply message in the worst case scenario."

Blockstream
Jade Security Disclosure
This disclosure gives more context on the Jade firmware vulnerability and information for our users on how to upgrade and stay safe.