Pages: [1]   Go Down
  Print  
Author Topic: YubiKey vulnerability will let attackers clone the authentication device  (Read 120 times)
HCK
Global Moderator
Hero Member
*****
Posts: 79425



« on: September 07, 2024, 04:05:04 pm »

YubiKey vulnerability will let attackers clone the authentication device

<p>NinjaLab, a security research company, has <a data-i13n="cpos:1;pos:1" href="https://gizmodo.com/its-possible-to-clone-yubikeys-thanks-to-a-newly-discovered-vulnerability-2000494682">discovered a vulnerability[/url] that would allow bad actors to clone YubiKeys. As the company has explained in a <a data-i13n="cpos:2;pos:1" href="https://www.yubico.com/support/security-advisories/ysa-2024-03/">security advisory[/url], NinjaLab found a vulnerability in the cryptographic library used in the <a data-i13n="cpos:3;pos:1" href="https://www.engadget.com/2018-09-24-yubikey-5-fido2-support.html">YubiKey 5 Series[/url]. In particular, it found a cryptographic flaw in the microcontroller, which the security researchers described as something that &quot;generates/stores secrets and then execute cryptographic operations&quot; for security devices like bank cards and FIDO hardware tokens. YubiKeys are the most well-known FIDO authentication keys, and they're supposed to make accounts more secure, since users would have to plug it into their computers before they could log in.&nbsp;</p>
<p>The researchers explained how they discovered the vulnerability because they found an open platform based on Infineon's cryptographic library, which Yubico uses. They confirmed that all YubiKey 5 models can be cloned, and they also said that the vulnerability isn't limited to the brand though they've yet to try and clone other devices.</p>
<span id="end-legacy-contents"></span><p>That vulnerability has apparently gone unnoticed for 14 years, but just because it has now come to light doesn't mean anybody can exploit it to clone YubiKeys. To start with, bad actors will need to have physical access to the token they want to copy. Then, they have to take it apart and use expensive equipment, including an oscilloscope, to &quot;perform electromagnetic side-channel measurements&quot; needed to analyze the token. In the researchers' <a data-i13n="cpos:4;pos:1" href="https://ninjalab.io/wp-content/uploads/2024/09/20240903_eucleak.pdf">paper[/url], they said their setup cost them around $11,000 and that using more advanced oscilloscopes could raise the setup's cost to $33,000. In addition, attackers might still need their target's PINs, passwords or biometrics to be able to access specific accounts.&nbsp;</p>
<p>Bottom line is that users part of government agencies or anybody handling very, very sensitive documents that could make them espionage targets would have to be very careful with their keys. For ordinary users, as researchers wrote in their paper, &quot;it is still safer to use YubiKey or other impacted products as FIDO hardware authentication token to sign in to applications rather than not using one.&quot;</p>This article originally appeared on Engadget at https://www.engadget.com/cybersecurity/yubikey-vulnerability-will-let-attackers-clone-the-authentication-device-143049198.html?src=rss

Source: YubiKey vulnerability will let attackers clone the authentication device
Logged
Pages: [1]   Go Up
  Print  
 
Jump to: