Saturday, July 20, 2024
EHA

Windows Hello Fingerprint Authentication Exploited on Microsoft, Dell, & Lenovo Laptops

Microsoft Windows Hello Fingerprint authentication was evaluated for security over its fingerprint sensors embedded in laptops.

This led to the discovery of multiple vulnerabilities that would allow a threat actor to bypass the Windows Hello Authentication completely.

The research was conducted on three laptops, which were Dell Inspiron 15, Lenovo ThinkPad T14, and Microsoft Surface Pro Type Cover with Fingerprint ID (for Surface Pro 8 /X). 

Document
Free Webinar

Live API Attack Simulation Webinar

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked. The session will cover: an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Concept of the Vulnerability

Match on Chip

According to the reports shared with Cyber Security News, this vulnerability is based on the concept of “match on chip” type sensors. Microsoft eliminated the method of storing “fingerprint templates” on the host. 

Instead, the fingerprint templates are now stored on-chip, which potentially reduces the privacy concerns of fingerprint exfiltration from the host in case the host is compromised.

However, this method also has a drawback as it does not prevent a malicious sensor from spoofing a legitimate sensor’s communication with the host, which can spoof an authorized and authenticated user.

Secure Device Connection Protocol (SDCP)

Microsoft developed the SDCP to secure the biometrics and fingerprint sensors.

This protocol consists of a set of standards and a secure communications protocol with goals such as ensuring the fingerprint device is trusted and healthy, and the input is protected between the fingerprint device and the host.

Secure Boot

Devices that support SDCP have a non-updatable bootloader in ROM (secure bootloader), which acts as the device’s root of trust.

Additionally, Microsoft issues a model-specific certificate and private key, which is confidential. However, it is used to sign the public key in a device-specific key pair embedded into the ROM.

Secure Connection BootStrap

This secure connection is authenticated and used to transmit the device’s attestation, which could allow the host to know that it is communicating with a valid device.

Furthermore, it is also used for additional biometric operations like new fingerprint enrolment and authentication.

Targets and Results

The first target was Dell Inspiron, which supports Windows Hello and SDCP. It has been discovered that when enrolling the fingerprints through Windows, it follows the process specified in the SDCP specification.

To bypass security, the initial process was to find the enrolled fingerprints. This was done by setting up a Wireshark dissector and checking the queries to the sensor from the Windows Login Screen. 

This reveals known fingerprints and IDs that can be used to authenticate the machine. As this operation is unauthenticated, it leaks this information by design.

Windows Hello Fingerprint Option (Source: Blackwing)
Windows Hello Fingerprint Option (Source: Blackwing)

Exploitation

To bypass this security, researchers booted with Linux and enumerated the valid fingerprint IDs.

After this, they enrolled a new fingerprint using a valid fingerprint ID and made a Man-in-the-Middle (MitM) attack between the host and the sensor. Proceeding further, they booted with Windows, intercepted, and rewrote the configuration packet using MitM. 

After performing this operation, researchers tried to log in as a legitimate user with the new fingerprint.

The exploitation was successful, and they were able to bypass the Windows Login security feature. Other attack methods were related to USB MitM and Custom TLS attacks.

Source: Blackwing
Source: Blackwing

A complete report about the attack methods has been published, providing detailed information about the attack scenario, method of exploitation, and other information.

Experience how StorageGuard eliminates the security blind spots in your storage systems by trying a 14-day free trial.

Website

Latest articles

Hackers Claiming Dettol Data Breach: 453,646 users Impacted

A significant data breach has been reported by a threat actor known as 'Hana,'...

CrowdStrike Update Triggers Widespread Windows BSOD Crashes

A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users,...

Operation Spincaster Disrupts Approval Phishing Technique that Drains Victim’s Wallets

Chainalysis has launched Operation Spincaster, an initiative to disrupt approval phishing scams that have...

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...
Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles