The seed phrases supplied by wallet providers were retained in plain text on customers' PCs as part of the "Restore Session" feature, according to Halborn's researchers. This means that bad actors may use software or physical access to get access. According to Halborn, they worked with wallet providers to patch their wallets against the vulnerability.
The most popular Web3 Ethereum wallet, MetaMask, stated that the significant security flaw only affected a "small fraction of users" and that the great majority of users were not at risk. There may be a "situation where user keys are found unencrypted on disc in unusual edge scenarios," according to the MetaMask blog. It has also released mitigations for its most recent browser extension version. Meanwhile, Phantom, the most popular web3 wallet on the Solana blockchain, announced that it began distributing remedies in January, three months after Halborn first identified the flaw. Phantom also stated that another comprehensive patch would be released next week.