Windows Hello Fingerprint Authentication Exploited on Microsoft, Dell, & Lenovo Laptops

Microsoft Windows Hello Fingerprint authentication was evaluated for security over its fingerprint sensors embedded in laptops.

This led to the discovery of multiple vulnerabilities that would allow a threat actor to bypass the Windows Hello Authentication completely.

The research was conducted on three laptops, which were Dell Inspiron 15, Lenovo ThinkPad T14, and Microsoft Surface Pro Type Cover with Fingerprint ID (for Surface Pro 8 /X). 

Document
Free Webinar

Live API Attack Simulation Webinar

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked. The session will cover: an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Concept of the Vulnerability

Match on Chip

According to the reports shared with Cyber Security News, this vulnerability is based on the concept of “match on chip” type sensors. Microsoft eliminated the method of storing “fingerprint templates” on the host. 

Instead, the fingerprint templates are now stored on-chip, which potentially reduces the privacy concerns of fingerprint exfiltration from the host in case the host is compromised.

However, this method also has a drawback as it does not prevent a malicious sensor from spoofing a legitimate sensor’s communication with the host, which can spoof an authorized and authenticated user.

Secure Device Connection Protocol (SDCP)

Microsoft developed the SDCP to secure the biometrics and fingerprint sensors.

This protocol consists of a set of standards and a secure communications protocol with goals such as ensuring the fingerprint device is trusted and healthy, and the input is protected between the fingerprint device and the host.

Secure Boot

Devices that support SDCP have a non-updatable bootloader in ROM (secure bootloader), which acts as the device’s root of trust.

Additionally, Microsoft issues a model-specific certificate and private key, which is confidential. However, it is used to sign the public key in a device-specific key pair embedded into the ROM.

Secure Connection BootStrap

This secure connection is authenticated and used to transmit the device’s attestation, which could allow the host to know that it is communicating with a valid device.

Furthermore, it is also used for additional biometric operations like new fingerprint enrolment and authentication.

Targets and Results

The first target was Dell Inspiron, which supports Windows Hello and SDCP. It has been discovered that when enrolling the fingerprints through Windows, it follows the process specified in the SDCP specification.

To bypass security, the initial process was to find the enrolled fingerprints. This was done by setting up a Wireshark dissector and checking the queries to the sensor from the Windows Login Screen. 

This reveals known fingerprints and IDs that can be used to authenticate the machine. As this operation is unauthenticated, it leaks this information by design.

Windows Hello Fingerprint Option (Source: Blackwing)

Exploitation

To bypass this security, researchers booted with Linux and enumerated the valid fingerprint IDs.

After this, they enrolled a new fingerprint using a valid fingerprint ID and made a Man-in-the-Middle (MitM) attack between the host and the sensor. Proceeding further, they booted with Windows, intercepted, and rewrote the configuration packet using MitM. 

After performing this operation, researchers tried to log in as a legitimate user with the new fingerprint.

The exploitation was successful, and they were able to bypass the Windows Login security feature. Other attack methods were related to USB MitM and Custom TLS attacks.

Source: Blackwing

A complete report about the attack methods has been published, providing detailed information about the attack scenario, method of exploitation, and other information.

Experience how StorageGuard eliminates the security blind spots in your storage systems by trying a 14-day free trial.

Eswar

Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS devices.…

1 day ago

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts…

3 days ago

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits…

3 days ago

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations…

4 days ago

Google Chrome Security, Critical Vulnerabilities Patched

Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions…

4 days ago

Notorious WrnRAT Delivered Mimic As Gambling Games

WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games…

4 days ago