Новости компьютерной безопасности:

  Latest News

YubiKeys cryptographic Flaw Let Attackers Clone Devices by Extracting Private Key

С сайта: Vulnerability(cybersecuritynews.com)

YubiKeys cryptographic Flaw Let Attackers Clone Devices by Extracting Private Key

Author: Guru Baran

Security researchers have uncovered a significant vulnerability in YubiKeys, specifically targeting the YubiKey 5 Series. This vulnerability, identified as a side-channel attack, allows attackers to clone these devices by extracting the secret keys stored within them.

The attack exploits a flaw in the Infineon cryptographic library used in the secure elements of these devices, which are widely regarded as robust authentication tools.

The vulnerability, termed “EUCLEAK,” was discovered by NinjaLab researchers, who found that the Infineon Elliptic Curve Digital Signature Algorithm (ECDSA) implementation in YubiKey 5 Series is susceptible to side-channel attacks. The attack targets the non-constant-time modular inversion operation within the ECDSA, allowing attackers to extract the secret key used for cryptographic operations.

How the Attack Works
  1. Side-Channel Exploitation : The attack requires physical access to the YubiKey device. By using electromagnetic (EM) side-channel measurements, attackers can capture the cryptographic operations performed by the device. This process involves placing an EM probe near the device to record the signals emitted during ECDSA computations.
  2. Modular Inversion Vulnerability : The core of the attack lies in the modular inversion step of the ECDSA, where the nonce (a random number used once per signature) is inverted. The Infineon implementation does not perform this operation in constant time, leading to timing leaks that can be exploited to recover the nonce.
  3. Key Recovery : Once the nonce is recovered, the attacker can compute the private key using the known ECDSA signature and public key. This allows the attacker to clone the YubiKey, effectively bypassing its security.

The vulnerability affects all YubiKey 5 Series devices with firmware versions below 5.7. These devices are commonly used for two-factor authentication (2FA) and other security-critical applications.

cyber security newsYubiKey 5 Series devices
The attack also extends to other products using Infineon’s cryptographic library, including some Trusted Platform Modules (TPMs) and potentially other secure systems like electronic passports and cryptocurrency hardware wallets.

Mitigation and Recommendations
Yubico has acknowledged the vulnerability found in Infineon’s cryptographic library, which is used in YubiKey 5 Series, and Security Key Series with firmware versions prior to 5.7.0, as well as YubiHSM 2 with firmware versions prior to 2.4.0.

“An attacker could exploit this issue as part of a sophisticated and targeted attack to recover affected private keys. The attacker would need physical possession of the YubiKey, Security Key, or YubiHSM, knowledge of the accounts they want to target, and specialized equipment to perform the necessary attack,” Yubico said.

Not Affected Products Affected Products YubiKey 5 Series version 5.7.0 and newerYubiKey 5 Series versions prior to 5.7YubiKey 5 FIPS Series 5.7 and newer (FIPS submission in process)YubiKey 5 FIPS Series prior to 5.7YubiKey Bio Series versions 5.7.2 and newerYubiKey 5 CSPN Series prior to 5.7Security Key Series versions 5.7.0 and newerYubiKey Bio Series versions prior to 5.7.2YubiHSM 2 versions 2.4.0 and newerSecurity Key Series all versions prior to 5.7YubiHSM 2 FIPS versions 2.4.0 and newerYubiHSM 2 versions prior to 2.4.0YubiHSM 2 FIPS versions prior to 2.4.0
How to Check the version of the YubiKey
Using the Yubico Authenticator, you can determine the YubiKey model and version. The upper left corner of the Home screen displays the key’s series and model. In this example, the YubiKey is identified as a YubiKey 5C NFC with a version of 5.7.0.

cyber security news
For users currently using vulnerable YubiKeys, it is recommended to:

  • Continue Using YubiKeys : Despite the vulnerability, using YubiKeys is still safer than relying solely on passwords for authentication.
  • Monitor for Clones : Implement monitoring mechanisms to detect cloned devices, such as checking for unusual authentication activities.
  • Consider Alternatives : Where possible, use cryptographic algorithms that do not rely on vulnerable operations or switch to updated devices.

The discovery of the EUCLEAK vulnerability underscores the importance of constant-time cryptographic implementations to prevent side-channel attacks. While the attack requires physical access and sophisticated equipment, it highlights potential risks in widely used security devices.



#Cyber_Security_News #Vulnerability #cyber_security #cyber_security_news #vulnerability

Оригинальная версия на сайте: YubiKeys cryptographic Flaw Let Attackers Clone Devices by Extracting Private Key
Вернуться к списку новостей К свежим новостям Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.

Вернуться к списку новостей Здесь был google AdSense.
Вместо рекламы товаров началась политическая агитация.
Отключено до получения извинений.


Новости проекта CSN:

✉ CSN.net4me.net

Обновление сайта csn.net4me.net

Обновление сайта csn.net4me.net 💻
cyber security news
  • Физически мы переехали на новый сервер. Благодарим наших подписчиков и постоянных читателей за терпение и понимание.
  • Сайт csn.net4me.net полностью адаптирован для работы по шифрованному SSL соединению.
  • Изменен механизм обработки и отображения опасных и критических уязвимостей.

Благодарим что вы с нами.


#CSN_обновление_сайта
https://csn.net4me.net/cyber_security_8301.html

Дополнительный материал

О проекте CSN

Проект CSN.net4me.net родился 16 Марта 2018 года.
Проект находится в самом начале своего развития. Конечно оформление, наполнение будет меняться. Одно останется неизменным - самые свежие новости компьютерной и сетевой безопасности.

О проекте net4me

Проект net4me.net развивался как сборник готовых решений и документации по темам компьютерной безопасности, сетевых решений и СПО (в часности linux). Темпы развития IT отрасли оказались столь быстрыми, что некоторые знания, технологии и информация о них устаревали мгновенно. Тем не менее, некоторый материал net4me.net до сих пор востребован.

Об источниках

Новости берутся CSN из открытых и доступных каждому источников. Авторы проекта стараются подбирать авторитетные и проверенные источники. Но, тем не менее, не несут ответственности за содержимое новостей. В каждой новости указывается источник этой новости, её автор и ссылка на оригинал новости.

Информация

Если вы желаете чтобы новости вашего ресурса были размещены на сайте CSN, то свяжитесь с авторами проекта csn@net4me.net и предложите ссылку на rss или xml ленту новостей вашего ресурса. Любая предложенная информация будет рассмотрена редакцией.