Tuesday, May 28, 2024

Microsoft Windows Face Authentication Bypassed with a Spoofed Photo

Windows 10 provides Face Authentication technology with specific Windows “Hello compatible cameras,” it uses a camera exceptionally designed for close infrared (IR) imaging to authenticate and unlock Windows devices as well as unlock your Microsoft Passport.

Due to insecure implementation in face recognition in Windows 10 versions, security researchers show it is possible to bypass the Authentication with a modified printed photo.

With the modified photo of an authorized person, an unauthorized user can log in to the locked windows system as a spoofed authorized user.

The vulnerability resides in both with default Windows Hello configuration and windows hello configuration with anti-spoofing enabled.

Researchers demonstrated the vulnerability with laptop and Microsoft Surface Pro 4 device that running Windows 10 Pro.

For example, the spoofing attack performed against a laptop device (Dell Latitude E7470) running Windows 10 Pro (Version 1703) with a Windows Hello compatible webcam [3] and against a Microsoft Surface Pro 4 device [4] running Windows 10 Pro (Version 1607) with the built-in camera,researchers said.

Affected Version(s):
Windows 10 Pro (Version 1709, OS Build 16299.19)
Windows 10 Pro (Version 1703, OS Build 15063.726)
Windows 10 Pro (Version 1703, OS Build 15063.674)
Windows 10 Pro (Version 1703, OS Build 15063.483)
Windows 10 Pro (Version 1607, OS Build 14393.1914)
Windows 10 Pro (Version 1607, OS Build 14393.1770)
Windows 10 Pro (Version 1511, OS Build 10586.1232)

Once again the facial verification failed, last month researchers proved that iPhone X Face ID could be bypassed with a 3D printed mask. Later on, A Women in China was able to unlock iPhone X through her friend facial recognition ID without using any 3D print hardware and face mask.

Website

Latest articles

DDNS Service In Fortinet Or QNAP Embedded Devices Exposes Sensitive Data, Researchers Warn

Hackers employ DNS for various purposes like redirecting traffic to enable man-in-the-middle attacks, infecting...

PoC Exploit Released For macOS Privilege Escalation Vulnerability

A new vulnerability has been discovered in macOS Sonoma that is associated with privilege...

CatDDoS Exploiting 80+ Vulnerabilities, Attacking 300+ Targets Daily

Malicious traffic floods targeted systems, servers, or networks in Distributed Denial of Service (DDoS)...

GNOME Remote Desktop Vulnerability Let Attackers Read Login Credentials

GNOME desktop manager was equipped with a new feature which allowed remote users to...

Kesakode: A Remote Hash Lookup Service To Identify Malware Samples

Today marks a significant milestone for Malcat users with the release of version 0.9.6,...

Cisco Firepower Vulnerability Let Attackers Launch SQL Injection Attacks

 A critical vulnerability has been identified in Cisco Firepower Management Center (FMC) Software's web-based...

Hackers Exploit WordPress Plugin to Steal Credit Card Data

Hackers have exploited an obscure WordPress plugin to inject malware into websites, specifically targeting...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles