Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Breach in biometric verification on PCs

Security vulnerabilities in fingerprint recognition sensors

Recent research highlights vulnerabilities in the fingerprint sensors of some laptops, which allow unauthorized access. The use of secure protocols such as SDCP is recommended.
This pill is also available in Italian language

Recent research has uncovered serious flaws in the fingerprint sensors used by some popular laptop models such as the Dell Inspiron 15, Lenovo ThinkPad T14 and Microsoft Surface Pro in devices produced by Goodix, Synaptics and ELAN, which implement "match on chip" (MoC) technology where biometric verification is managed directly by the sensor.

Compromise via AitM attacks

Although Microsoft introduced the Secure Device Connection Protocol (SDCP) to strengthen security, researchers have discovered a way to circumvent these measures through adversary-in-the-middle (AitM) attacks. The ELAN sensor, in particular, was vulnerable to counterfeiting and transmitted security identifiers in clear text, allowing a USB device to impersonate the fingerprint sensor and access the system without authorization.

Vulnerabilities specific to fingerprint sensors

The Synaptics sensor had the SDCP protocol disabled by default, leaving security to a faulty custom Transport Layer Security (TLS) stack, which made it possible to bypass the biometric authentication system. As for Goodix, a discrepancy in the fingerprint registration process between Windows and Linux operating systems was exploited, with the latter not supporting SDCP, thus allowing the registration of a fingerprint on Linux which is then recognized by Windows .

Risk mitigation recommendations

The researchers suggest that hardware manufacturers enable SDCP and subject fingerprint sensors to independent verification by qualified experts. The findings highlight the importance of the correct implementation of security measures by OEMs, so as to guarantee effective and comprehensive protection that fully meets the security standards established by protocols such as SDCP.

Video

Follow us on Threads for more pills like this

11/23/2023 10:56

Marco Verro

Last pills

Cloudflare repels the most powerful DDoS attack ever recordedAdvanced defense and global collaboration to tackle new challenges of DDoS attacks

Silent threats: the zero-click flaw that compromises RDP serversHidden risks in remote work: how to protect RDP servers from invisible attacks

Discovery of vulnerability in Secure Boot threatens device securityFlaw in the Secure Boot system requires urgent updates to prevent invisible intrusions

North korean cyberattacks and laptop farming: threats to smart workingAdapting to new digital threats of remote work to protect vital data and infrastructures

Don’t miss the most important news
Enable notifications to stay always updated