Breach Blog

Published: 24 Nov 2023

Unveiling Vulnerabilities: Windows Hello Fingerprint Sensors Under Scrutiny

In a collaborative effort, security researchers from Blackwing Intelligence and Microsoft's Offensive Research and Security Engineering (MORSE) delved into the security of fingerprint sensors used for Windows Hello authentication. Their findings, unveiled at Microsoft's BlueHat conference, expose alarming vulnerabilities in widely-used laptops - a Dell Inspiron 15, Lenovo ThinkPad T14s, and Microsoft Surface Pro X.

The Experiment:

The researchers subjected Match-on-Chip fingerprint sensors, where fingerprint data resides within the chip, to rigorous software and hardware attacks. Importantly, all three laptops exhibited vulnerabilities, emphasizing the need for heightened security measures.

The Vulnerabilities Unveiled:

  1. Dell Inspiron 15:
  • Exploitation Method: Enumeration of valid IDs linked to user fingerprints.
  • Attack Approach: Enrolling the attacker's fingerprint by mimicking a legitimate user's ID.
  1. Lenovo ThinkPad T14s:
  • Exploitation Method: Similar to Dell, the attack involved enumerating valid IDs and enrolling the attacker's fingerprint.
  • Note: These attacks necessitated physical access to the laptops.
  1. Microsoft Surface Pro X:
  • Exploitation Method: Disconnecting the Type Cover (keyboard with fingerprint sensor) and connecting a USB device to spoof the fingerprint sensor.
  • Attack Approach: Instructing the system that an authorized user is logging in.

Security Implications:

These revelations underscore the imperative for a robust security framework, especially with physical access posing a significant threat. Windows Hello, touted for its biometric authentication, faces scrutiny as attackers exploit vulnerabilities associated with fingerprint sensors.

Physical access, though requiring theft or the "evil maid" method, remains a viable threat. The simplicity with which attackers could enroll their fingerprints underscores the urgency for enhanced security protocols.

This revelation serves as a wake-up call for both users and manufacturers. Understanding the limitations of current biometric authentication methods is crucial. Users should be cautious about the physical security of their devices, while manufacturers must innovate and fortify these security layers.

Microsoft's Response:

While the research exposes vulnerabilities, Microsoft has taken a transparent approach by making the findings public. The video presentation at the BlueHat conference emphasizes collaborative efforts in addressing these challenges.

Conclusion:

The intersection of technology and security is complex, and this research illuminates a facet where advancements must align with robust defenses. As we navigate an era increasingly reliant on biometric authentication, the imperative to fortify these systems becomes paramount. This revelation serves as a catalyst for both the industry and users to prioritize and advance the security of biometric authentication systems.