Ledger's security team, Ledger Donjon, discovered a vulnerability in Tangem cards that could be exploited by brute-force password attacks. These cards can be exploited with specialized hardware equipment to bypass Tangem's built-in brute-force delay system. The technique Ledger used is known as "tearing." Successful tearing allowed Ledger Donjon to try around 2.5 login passwords per second, which decreases the time required to brute-force weak passwords.
Tangem Cards aren't upgradable, so this problem can't be fixed. What users can do is use more complex passwords of at least 8 characters, including letters, digits, and special symbols.
Here are more details on the report Ledger Donjon wrote and shared with Tangem:
https://www.ledger.com/blog-brute-force-attack-tangemTangem’s Anti-Brute-Force SystemAfter 6 incorrect password attempts on a Tangem card, a 1-second delay is added. Each new incorrect password increases this delay by 1 second, up to a maximum of 45 seconds.
If we take this into account, Ledger estimates how long it would take to brute-force simple PINs of 4-8 digits:
- 4-digit PIN: ~5 days
- 6-digit PIN: ~520 days
- 8-digit PIN: ~143 years
The Tearing AttackA tearing attack interrupts power to the card during the operation of counting the login entries. If done successfully, an attacker can get unlimited password entries without triggering a delay in the system. Tangem Cards don't erase the seed after X number of unsuccessful password entries like some other wallets do.
What Did Ledger Donjon Do?They modified Tangem cards, soldering their own antennas to capture signals and measure electromagnetic emissions (EM). Tangem uses a secure channel on its cards to protect against data exchanges. This channel uses a password that is derived from the user's password. By brute-forcing the secure channel, Ledger could also brute-force the login password.
Ledger Donjon discovered that this channel is vulnerable to tearing attacks. When observed on monitors, the EM emissions between correct and incorrect passwords were different, making them easy to distinguish. Using equipment that Ledger claims costs under $5,000, they were able to test passwords continuously without delays.

Impacts of the Tearing Attacks Tearing attacks require physical access to the cards and special equipment. The attackers can then try new passwords at a rate of around 2.5 passwords per second compared to 1 password every 45 seconds.
The biggest risk is with weak passwords made up of a common word. They are vulnerable to dictionary attacks. An attacker could try 1 million common passwords in around 4.5 days.
Here is a comparison of an attack rate of 2.5 passwords per second compared to 1 password every 45 seconds:
Ledger's Recommendations to Tangem and Tangem UsersUse strong passwords.
- 8 characters or more
- Letters, numbers, and special characters
- Tangem shouldn't allow users to use weak passwords
- Current users of weak passwords should upgrade to more complex ones
Source:
https://www.ledger.com/blog-brute-force-attack-tangem