News + Trends

Microsoft's "Windows Hello" is not as secure as expected

Florian Bodoky
23.11.2023
Translation: machine translated

Security firm discovers loopholes in fingerprint sensors - and was able to gain access to Windows laptops. This was apparently achieved without much effort.

Since Windows 10, users have been using "Windows Hello" technology to log in to their devices. In addition to a PIN code, users can also authenticate themselves using biometric means, such as a fingerprint. As there are numerous different manufacturers of Windows laptops, different fingerprint sensors are also used.

However, this authentication method can apparently be circumvented - with relatively simple means. This was discovered by the security company "Blackwing". The reason for this are several vulnerabilities in several fingerprint sensors.

USB device bypasses fingerprint lock

The affected fingerprint sensors come from the manufacturers Goodix, Synaptics and ELAN. Their sensors are used in laptops from Dell, Lenovo and Microsoft, among others. Blackwing was commissioned by Microsoft to investigate a Dell Inspiron 15, a Lenovo ThinkPad T14 and a Surface Pro X from Microsoft.

Fingerprint login is enabled in 85 per cent of all cases.
Fingerprint login is enabled in 85 per cent of all cases.
Source: Florian Bodoky

Blackwing managed to trigger a man-in-the-middle attack (MITM) using a prepared USB device. As soon as the USB stick was inserted, it granted access to the notebook if fingerprint login was activated. This is estimated to be the case for 85 per cent of all notebooks - not least because Microsoft is strongly promoting passkey technology. The MITM took place in the interface between the fingerprint scanner and the host - where Blackwing was able to localise it.

According to the company, this suggests that the vulnerability is not entirely Microsoft's fault. This is because the company has developed the Secure Device Connection Protocol (SDCP) for secure data exchange between the sensor and host. According to Blackwing, the manufacturers do not really understand how the SDCP works. The protocol was not even activated on two of the three devices tested. Blackwing recommends that notebook manufacturers ensure that the SDCP is activated and correctly implemented in the fingerprint sensor.

Microsoft, meanwhile, is on the losing end as far as the vulnerability is concerned. However, they also need to look at themselves: The Surface Pro X was also one of the notebooks on which SDCP was not activated.

Cover image. Shutterstock

22 people like this article


User Avatar
User Avatar

I've been tinkering with digital networks ever since I found out how to activate both telephone channels on the ISDN card for greater bandwidth. As for the analogue variety, I've been doing that since I learned to talk. Though Winterthur is my adoptive home city, my heart still bleeds red and blue. 

11 comments

Avatar
later