Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » Security researchers bypass Windows Hello with fake fingerprints with Raspberry Pi 4
  • acctlockout 1
    Configure Local Administrators Account lockout Windows
  • drivelock 1280x720 1
    Concept of DriveLock with a focus on Encryption Security | Vulnerability Scans and Assessment
  • The evolution of Windows authentication   NTLM to Keberos
    Bidding Farewell to NTLM in favour of Kerberos Windows
  • Perform Site Maintenance or reset this site greyed out
    Fix “Perform Site Maintenance or reset this site” greyed out Windows Server
  • Repository time shift detected
    Fix Repository time shift detected: Immutability flag cannot be set Backup
  • Slide1 3
    Azure Virtual Networks: Preparing Azure and On-Premises Virtual Networks with Azure CLI Commands AWS/Azure/OpenShift
  • bitbucketexportimport
    Import Repo to Bitbucket Cloud: Seamless Migration to GitLab Version Control System
  • Webp.net resizeimage 2
    Add or Remove Network Interface from a VM in Azure AWS/Azure/OpenShift

Security researchers bypass Windows Hello with fake fingerprints with Raspberry Pi 4

Posted on 27/11/202318/09/2024 Christian By Christian No Comments on Security researchers bypass Windows Hello with fake fingerprints with Raspberry Pi 4
Windows Hello with fake fingerprints

Security researchers discovered vulnerabilities in the fingerprint sensors of some Windows PCs. These could be exploited to bypass Windows Hello’s biometric fingerprint login. The affected sensors manufactured by Elan, Googix, and Synaptics, all use a match-on-chip (MoC) design where the biometric test occurs within a shielded microprocessor on the chip itself. In this article, we will discuss “Security researchers bypass Windows Hello with fake fingerprints with Raspberry Pi 4”. Please see All you need to know before deploying Windows Hello for Business Key and Certificate Trust.

During tests on laptops such as Dell Inspiron 15, Microsoft Surface Pro X, and Lenovo ThinkPad T14, researchers successfully exploited vulnerabilities using a Raspberry Pi 4 with Linux and man-in-the-middle tools.

Please see this YouTube video for more information.

They demonstrated how security researchers could bypass Windows Hello using fake fingerprints and were able to decrypt the TLS protocol of the Synaptics sensor and replay it with modifications.

Please see “Network cable Unplugged: Fix VMware “Warning – Multiple default gateways are intended to provide redundancy to a single network“. Also, see how to Harden your Veeam Backup Server with Microsoft AppLocker.

Unplug Sensors

In some cases, attackers could unplug the fingerprint sensors on Dell and Lenovo laptops and connect their manipulated sensors.

The research raises questions about Microsoft's oversight, as SDCP protection wasn't checked for activation by the fingerprint sensor manufacturers. 

The report doesn’t provide specific solutions for affected users but suggests that a BIOS password may provide some protection since Windows must be running for the described attacks.

Also, see Mitigating ‘PrintNightmare’ Vulnerability: Print Spooler Solutions, how Disable UAC with Group Policy and enable PIN in Windows Hello.

Recommendations by Security Experts to mitigate Windows Hello

Secure Device Connection Protocol (SDCP) protection mechanism has been implemented by Microsoft to prevent unauthorized access. This helps close the vulnerabilities that allowed security researchers to bypass Windows Hello with fake fingerprints.

The researchers recommend that fingerprint sensor manufacturers enable SDCP and undergo third-party security audits for their implementations.

It remains unclear whether the identified security issues can be entirely addressed through software updates.

I hope you found this post very useful. Kindly share your thoughts in the comment section below.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment Tags:Microsoft Windows, security, Windows 10, Windows 11, Windows Security, Windows Server 2016

Post navigation

Previous Post: How to Disable Integrated Graphics on Windows
Next Post: How to Grant Local Admin Permissions to a Group [Part 1]

Related Posts

  • Featured image new
    How to update the BIOS on your Dell system Security | Vulnerability Scans and Assessment
  • Protech Synology NAS
    Cybersecurity Tips to Secure Synology NAS against Ransomware Reviews
  • Featured image 2
    Find and remove Malware with Microsoft Defender Offline Anti-Virus Solution
  • rrd
    How to uninstall the DriveLock Agent from your device Security | Vulnerability Scans and Assessment
  • Safeguard Your PC Against Common Malware Entry Points
    Safeguard Your PC Against Common Malware Entry Points Security | Vulnerability Scans and Assessment
  • hero activedirectory 1
    Active Directory Contact and a User Account Object Differences Security | Vulnerability Scans and Assessment

More Related Articles

Featured image new How to update the BIOS on your Dell system Security | Vulnerability Scans and Assessment
Protech Synology NAS Cybersecurity Tips to Secure Synology NAS against Ransomware Reviews
Featured image 2 Find and remove Malware with Microsoft Defender Offline Anti-Virus Solution
rrd How to uninstall the DriveLock Agent from your device Security | Vulnerability Scans and Assessment
Safeguard Your PC Against Common Malware Entry Points Safeguard Your PC Against Common Malware Entry Points Security | Vulnerability Scans and Assessment
hero activedirectory 1 Active Directory Contact and a User Account Object Differences Security | Vulnerability Scans and Assessment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • acctlockout 1
    Configure Local Administrators Account lockout Windows
  • drivelock 1280x720 1
    Concept of DriveLock with a focus on Encryption Security | Vulnerability Scans and Assessment
  • The evolution of Windows authentication   NTLM to Keberos
    Bidding Farewell to NTLM in favour of Kerberos Windows
  • Perform Site Maintenance or reset this site greyed out
    Fix “Perform Site Maintenance or reset this site” greyed out Windows Server
  • Repository time shift detected
    Fix Repository time shift detected: Immutability flag cannot be set Backup
  • Slide1 3
    Azure Virtual Networks: Preparing Azure and On-Premises Virtual Networks with Azure CLI Commands AWS/Azure/OpenShift
  • bitbucketexportimport
    Import Repo to Bitbucket Cloud: Seamless Migration to GitLab Version Control System
  • Webp.net resizeimage 2
    Add or Remove Network Interface from a VM in Azure AWS/Azure/OpenShift

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,825 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.