Microsoft fixes serious Windows Hello security flaw

Fraud
(Image credit: Shutterstock / Sapann Design)

Cybersecurity experts have shared a proof-of-concept to bypass the Windows Hello biometric authentication system. 

Threat actors can exploit the bypass, demonstrated by identity and access management (IAM) vendor CyberArk, to access an organization’s sensitive data by impersonating a privileged account.

Leaning on official figures from Microsoft that suggest that over 84% of Windows 10 users sign-in to their devices using Windows Hello, CyberArk argues that the bypass poses a grave security risk for businesses transitioning to password-less authentication.

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and you can also choose to enter the prize draw to win a $100 Amazon voucher or one of five 1-year ExpressVPN subscriptions.

>> Click here to start the survey in a new window <<

“While our research was specific to Windows Hello and more so the enterprise offering, Windows Hello for Business, it’s important to note that potentially any authentication system that allows a pluggable third-party USB camera to act as biometric sensor could be susceptible to this attack without proper mitigation,” writes CyberArk’s Security Researcher, Omer Tsarfati.

Targeted attacks

The exploit, which CyberArk likens to the one used by Tom Cruise in hit film Minority Report, involves using a custom USB device to steal an infrared image of the target’s face they want to impersonate. 

The criminal can then use this image to compromise any facial recognition product which relies on a USB camera, such as Windows Hello.

CyberArk responsibly disclosed the issue to Microsoft, who fixed it as part of its July Patch Tuesday update. 

However, based on preliminary testing, CyberArk researchers believe that while the mitigation does limit the attack surface, it relies on users having specific cameras.

“Inherent to system design, implicit trust of input from peripheral devices remains. To mitigate this inherent trust issue more comprehensively, the host should validate the integrity of the biometric authentication device before trusting it,“ says Tsarfati.

Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.