Menu Close

Windows Hello Bypass – Tricks PCs Biometrics Safeguards!

Share This Post

Share on facebook
Share on linkedin
Share on twitter
Share on email

A Windows security bug would allow an attacker to fool a USB camera used in the biometric facial-recognition part of the system.

A vulnerability in Microsoft’s Windows 10 password-free authentication system has been uncovered that could allow an attacker to spoof an image of a person’s face to trick the facial-recognition system & take control of a device.

Without a Password

Windows Hello is a feature in Windows 10 that allows users to authenticate themselves without a password, using a PIN code or biometric identity—either a fingerprint or facial recognition—to access a device or machine. According to Microsoft, about 85% of Windows 10 users use the system.

The Windows Hello bypass vulnerability, tracked as CVE-2021-34466, requires an attacker to have physical access to a device to exploit it, according to researchers at CyberArk Labs who discovered the defect in March.

Authentication Process

Then, they can go on “to manipulate the authentication process by capturing or recreating a photo of the target’s face and subsequently plugging in a custom-made USB device to inject the spoofed images to the authenticating host,” Omer Tsarfati, Cybersecurity Researcher at CyberArk Labs, wrote in a report about the vulnerability published Tues.

Further, exploitation of the bypass can extend beyond Windows Hello systems to “any authentication system that allows a pluggable 3rd-party USB camera to act as biometric sensor,” Tsarfati noted.

No Evidence

Researchers have no evidence that anyone has tried or used the attack in the wild, but someone with motive could potentially use it on a targeted espionage victim, such as “a researcher, scientist, journalist, activist or privileged user with sensitive IP on their device, for example,” according to the analysis.

Microsoft addressed the vulnerability — which affects both consumer & business versions of the feature — in its July Patch Tues. update. Also, Windows users with Windows Hello Enhanced Sign-in Security — a new security feature in Windows that requires specialised & pre-installed hardware, drivers & firmware — are protected against the any attacks “which tamper with the biometrics pipeline,” outlined Microsoft.

Mitigate the Issue

However, Tsarfati said that the solution may not fully mitigate the issue.

“Based on our preliminary testing of the mitigation, using Enhanced Sign-in Security with compatible hardware limits the attack surface but is dependent on users having specific cameras,” he explained.

“Inherent to system design, implicit trust of input from peripheral devices remains. To mitigate this inherent trust issue more comprehensively, the host should validate the integrity of the biometric authentication device before trusting it.”

Weakest Link

CyberArk researchers posted a video of a proof-of-concept (PoC) for how to exploit the vulnerability, which can be used on both the consumer version, Windows Hello, and an enterprise version of the feature called Windows Hello for Business (WHfB) that businesses use with Active Directory.

The bypass itself exploits a weakness in the biometric sensor of Windows Hello, which “transmits information on which the OS … makes its authentication decision,” he wrote. “Therefore, manipulating this information can lead to a potential bypass to the whole authentication system,” Tsarfati stated.

Biometric Sensor

For facial recognition, the biometric sensor is either a camera embedded in a device, such as a laptop, or connected to a computer via USB. Therefore, the entire process depends on this camera for proof of identity–which is where the vulnerability lies, particularly when a USB camera is used for authentication, he wrote.

“The answer lies in the input itself,” Tsarfati wrote. “Keyboard input is known only to the person who is typing before the information is entered into the system, while camera input isn’t.”

Therefore, using a camera to access “public” information—i.e., a person’s face—for authentication can easily be hijacked, he explained.

“It is similar to stealing a password, but much more accessible since the data face is out there,” Tsarfati wrote. “At the heart of this vulnerability lies the fact that Windows Hello allows external data sources, which can be manipulated, as a root of trust.”

Attack Vector

Researchers detailed a somewhat complex way for an attacker to capture someone’s image, save the captured frames, impersonate a USB camera device, & eventually send those frames to the Windows hello system for verification.

To prove concept, they created a custom USB device that acts as a USB camera with both infrared (IR) & Red Green Blue (RGB) sensors, using an evaluation board manufactured by NXP. They used this custom camera to transmit valid IR frames of the person they were targeting, while sending the RGB frames image of the cartoon character SpongeBob SquarePants.

“To our surprise, it worked!” Tsarfati wrote.

USB Camera

Based on this, an attacker would only need to  implement a USB camera that supports RGB & IR cameras & then send only 1 genuine IR frame of a victim to bypass the login phase of the device, while the RGB frames can contain any random image, he explained.

This whole process depends on an attacker having an IR frame of a potential victim to use in an attack, which can be done either by capturing 1 or converting 1 of the person’s regular RBG frames to an IR one, Tsarfati explained.

Bypass

“Our findings show that any USB device can be cloned, & any USB device can impersonate any other USB device,” he outlined.

“We used the IR frames of a person to ‘bypass’ the face recognition mechanism. We believe that those IR frames can be created out of regular colour images.”

 

More To Explore

Community Area

Books

Home Workouts

Recipe

spaghetti Bolognese
Days
Hours
Minutes
Seconds