pwshub.com

Newly discovered flaw makes some YubiKeys vulnerable to cloning

Serving tech enthusiasts for over 25 years.
TechSpot means tech analysis and advice you can trust.

In context: The YubiKey is a hardware security key that simplifies two-factor authentication. Instead of receiving codes via text or an app, users simply tap the YubiKey when logging into accounts, apps, or services that require 2FA. This adds an extra layer of security beyond just a password. However, as researchers have now demonstrated, the device is not infallible.

Researchers have uncovered a cryptographic flaw in the widely adopted YubiKey 5 series. The flaw, known as a side-channel vulnerability, makes the device susceptible to cloning if an attacker gains temporary physical.

The vulnerability was initially discovered by cybersecurity firm NinjaLab, which reverse-engineered the YubiKey 5 series and devised a cloning attack. They found that all YubiKey models running firmware versions prior to 5.7 are susceptible.

The issue stems from a microcontroller made by Infineon, known as the SLB96xx series TPM. Specifically, the Infineon cryptographic library fails to implement a crucial side-channel defense known as "constant time" during certain mathematical operations. This oversight allows attackers to detect subtle variations in execution times, potentially revealing the device's secret cryptographic keys. Even more concerning is that this particular chip is used in numerous other authentication devices, such as smartcards.

It's not all doom and gloom, however Yubico, the company behind YubiKeys, has already released a firmware update (version 5.7) that replaces the vulnerable Infineon cryptographic library with a custom implementation. The downside is that existing YubiKey 5 devices can't be updated with this new firmware, leaving all affected keys permanently vulnerable.

That said, existing YubiKey owners don't need to discard their devices. The attack in question requires significant resources – around $11,000 worth of specialized equipment – and advanced expertise in electrical and cryptographic engineering. It also necessitates knowledge of the targeted accounts and potentially sensitive information such as usernames, PINs, account passwords, or authentication keys.

"The attacker would need physical possession of the YubiKey, Security Key, or YubiHSM, knowledge of the accounts they want to target, and specialized equipment to perform the necessary attack," the company noted in its security advisory.

Fair to say, it's not something most cybercriminals can pull off. Targeted attacks by nation-states or well-funded groups are still a possibility, though extremely slim.

Yubico recommends continuing to use them, as they're still safer than relying solely on passwords. However, it's advisable to monitor for any suspicious authentication activities that could indicate a cloned device.

Image credit: Andy Kennedy

Source: techspot.com

Related stories
1 month ago - Researchers have discovered a vulnerability that allows hackers to gain direct access to services on your laptop through browsers like Chrome, Firefox, Safari and Edge.
1 month ago - The company says it is working on fixes for flaw presented at annual Black Hat security conference.
3 weeks ago - ATTACK OF THE CLONES — Sophisticated attack breaks security assurances of the most popular FIDO key. ...
1 month ago - In light of the recently disclosed Sinkclose vulnerability, AMD is releasing updates to address the issue across several processor families. These updates include all generations of EPYC processors, as well as the latest Threadripper and...
1 month ago - Security researchers at Quarkslab have discovered a backdoor in millions of RFID cards developed by Shanghai Fudan Microelectronics (FMSH). When properly exploited, this backdoor could be used to quickly clone contactless smart cards that...
Other stories
27 minutes ago - Mesmerizing, passionate and cerebral, this French historical drama is my pick for the best film of 2019 -- and all time.
27 minutes ago - How faithful is the new season of Rings of Power to the source material? I've analyzed up to episode 7 of season 2.
27 minutes ago - Losing power doesn't mean you have to lose your broadband connection, too. Here are ways to keep your internet on when the power is out.
27 minutes ago - Why You Can Trust CNET Our expert deal-hunting staff showcases the best price drops and discounts from reputable sellers daily. If you make a...
27 minutes ago - Think you can't lose your Social Security benefits? Think again. Here are the ways you could have them suspended or terminated.