Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Critical Flaw Found in Two-Factor Authenticator YubiKey Will Likely Not Be Patched
Newsletter
Newsletter →
HackerDose
HackerDose
  • Latest Stories
  • Security & Tech
    • Cybersecurity
    • Technology
    • Vulnerabilities
    • Dark Web
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
Reading: Critical Flaw Found in Two-Factor Authenticator YubiKey Will Likely Not Be Patched
Newsletter
Search
  • Latest Stories
  • Security & Tech
    • Security
    • Vulnerabilities
    • Dark Web
    • Technology
    • Privacy
  • Crypto & Blockchain
    • Cryptocurrency
    • Blockchain
    • Finance
    • Price Predictions
    • Guides
    • Regulation
© MRS Media Company. Hackerdose LLC. All Rights Reserved.

News » Critical Flaw Found in Two-Factor Authenticator YubiKey Will Likely Not Be Patched

NewsVulnerabilities

Critical Flaw Found in Two-Factor Authenticator YubiKey Will Likely Not Be Patched

A security flaw in YubiKey authentication devices could let attackers steal keys through a complex, expensive, and highly technical side-channel attack.

Marco Rizal
Last updated: September 5, 2024 5:56 am
By Marco Rizal - Editor, Journalist 3 Min Read
Share
Critical Flaw Found in Two Factor Authenticator Yubikey Will Likely Not Be Patched
SHARE

Security researchers discovered a flaw in Yubico's YubiKey and YubiHSM devices that could allow attackers to obtain private keys.

The flaw is present in older versions of the devices' firmware and affects the Infineon cryptographic library used in these products.

However, exploiting this vulnerability is difficult because it requires physical access to the device, specialized equipment, and advanced technical skills.

image 19
YubiKey series teardown (Credit: NinjaLab)

Yubico, the company behind YubiKey and YubiHSM, has confirmed the issue in question, but states that the attack is complex and unlikely to occur in everyday scenarios.

They have issued a security notice outlining the vulnerability, but do not intend to release a firmware update, putting some devices permanently at risk.

How the Attack Works

The attack, known as a side-channel attack, was discovered by NinjaLab' Thomas Roche in France.

It specifically targets the Elliptic Curve Digital Signature Algorithm (ECDSA) found in the affected devices.

Attackers can infer private keys by measuring how long it takes the device to perform specific cryptographic operations.

The attack is based on non-constant computing times during a specific mathematical operation known as modular inversion.

image 20
Use of probe to gauge the radio emissions emitted by vulnerable chips as part of the attack process. (Credit: NinjaLab)

Most cybercriminals will be unable to carry out the attack because it requires physical access to the YubiKey, expensive equipment, and custom software.

Nonetheless, it poses a risk in high-security settings where such resources may be available.

Affected Devices

The vulnerability affects YubiKey 5, YubiKey 5 FIPS, YubiKey Bio, YubiHSM, and YubiHSM 2 devices with firmware versions prior to 5.7.2.

Products such as the Feitian A22 JavaCard, which also uses Infineon's cryptographic library, are equally vulnerable.

While Yubico does not intend to release a firmware update for the affected devices, they do recommend several countermeasures to mitigate the risk.

Users, for example, can enable PIN or biometric protection on their devices, making it more difficult for attackers to gain access.

Additionally, shortening FIDO session durations and using RSA keys for certain operations can reduce exposure to this vulnerability.

Yubico's most recent firmware, version 5.7 and above, no longer employs the vulnerable Infineon library.

The company switched to its own cryptographic library, which was unaffected by the discovered flaw.

Should you replace your YubiKey?

Given the attack's complexity, most users are unlikely to face significant risk.

Individuals who work in high-security environments or handle sensitive information should consider replacing their affected YubiKeys or YubiHSM devices.

Yubico has not provided a replacement program or discounted rates for new devices, leaving the decision to replace vulnerable keys to the user.

Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Subscribe to our newsletter

Receive the latest news and stories straight to your inbox.

Latest stories

Bitcoin Holds at $85K as Global Trade Tensions and Fed Speculation Unfold

April 15, 2025

Michael Saylor Doubles Down on Bitcoin (BTC) with $285M Investment Amid Global Uncertainty

April 14, 2025

Mantra Faces Crisis After OM Token Crashes 90% in a Day

April 14, 2025

Solana (SOL) on the Verge of a Breakout: Could $300 Be the Next Target?

April 14, 2025

You might also like

U.S. Government Cracks Down On Commercial Spyware Vendors

U.S. Government Cracks Down On Commercial Spyware Vendors

The Hidden Windows Version You Cant Access

The Hidden Windows Version You Can’t Access

Kakao Pay Under Fire for Sharing 54 Billion Records of User Info with Alipay

Kakao Pay Under Fire for Sharing 54 Billion Records of User Info with Alipay

Russia Denies Flaws In E Summons System

Russia Denies Flaws In E-Summons System

Newsletter

Our website stores cookies on your computer. They allow us to remember you and help personalize your experience with our site

Quick Links

  • Contact Us
  • Search
  • Malware
  • Downloads

Company

  • About Us
  • Terms and Conditions
  • Cookies Policy
  • Privacy Policy
Advertise with us

Socials

Follow Us

© 2025 | HackerDose Media Company – All Rights Reserved

Welcome Back!

Sign in to your account

Lost your password?