Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » Security researchers bypass Windows Hello with fake fingerprints with Raspberry Pi 4
  • offload apps
    How to automatically offload unused Apps on iPhone Mac
  • Installing Jenkins
    How to Install and Configure Jenkins on Windows 11 Configuration Management Tool
  • AppLocker
    Fix unable to start the Application Identity Service Windows
  • featurekube
    How to Install and Use Minikube on a Linux System Containers
  • stopsappsfromstart
    How to Hide or Stop Apps Like OneDrive from Auto-Opening Mac
  • cisco asa 5510
    Copying TFTP Image to Flash Network | Monitoring
  • preometheus
    Monitoring Synology with Prometheus and Grafana Reviews
  • image 1
    Install and License Devolutions Remote Desktop Manager on Mac Mac

Security researchers bypass Windows Hello with fake fingerprints with Raspberry Pi 4

Posted on 27/11/202318/09/2024 Christian By Christian No Comments on Security researchers bypass Windows Hello with fake fingerprints with Raspberry Pi 4
Windows Hello with fake fingerprints

Security researchers discovered vulnerabilities in the fingerprint sensors of some Windows PCs. These could be exploited to bypass Windows Hello’s biometric fingerprint login. The affected sensors manufactured by Elan, Googix, and Synaptics, all use a match-on-chip (MoC) design where the biometric test occurs within a shielded microprocessor on the chip itself. In this article, we will discuss “Security researchers bypass Windows Hello with fake fingerprints with Raspberry Pi 4”. Please see All you need to know before deploying Windows Hello for Business Key and Certificate Trust.

During tests on laptops such as Dell Inspiron 15, Microsoft Surface Pro X, and Lenovo ThinkPad T14, researchers successfully exploited vulnerabilities using a Raspberry Pi 4 with Linux and man-in-the-middle tools.

Please see this YouTube video for more information.

They demonstrated how security researchers could bypass Windows Hello using fake fingerprints and were able to decrypt the TLS protocol of the Synaptics sensor and replay it with modifications.

Please see “Network cable Unplugged: Fix VMware “Warning – Multiple default gateways are intended to provide redundancy to a single network“. Also, see how to Harden your Veeam Backup Server with Microsoft AppLocker.

Unplug Sensors

In some cases, attackers could unplug the fingerprint sensors on Dell and Lenovo laptops and connect their manipulated sensors.

The research raises questions about Microsoft's oversight, as SDCP protection wasn't checked for activation by the fingerprint sensor manufacturers. 

The report doesn’t provide specific solutions for affected users but suggests that a BIOS password may provide some protection since Windows must be running for the described attacks.

Also, see Mitigating ‘PrintNightmare’ Vulnerability: Print Spooler Solutions, how Disable UAC with Group Policy and enable PIN in Windows Hello.

Recommendations by Security Experts to mitigate Windows Hello

Secure Device Connection Protocol (SDCP) protection mechanism has been implemented by Microsoft to prevent unauthorized access. This helps close the vulnerabilities that allowed security researchers to bypass Windows Hello with fake fingerprints.

The researchers recommend that fingerprint sensor manufacturers enable SDCP and undergo third-party security audits for their implementations.

It remains unclear whether the identified security issues can be entirely addressed through software updates.

I hope you found this post very useful. Kindly share your thoughts in the comment section below.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Pocket (Opens in new window) Pocket
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment Tags:Microsoft Windows, security, Windows 10, Windows 11, Windows Security, Windows Server 2016

Post navigation

Previous Post: How to Disable Integrated Graphics on Windows
Next Post: How to Grant Local Admin Permissions to a Group [Part 1]

Related Posts

  • Featured image Windows Security
    How to clear Cache and Manually Update Microsoft Defender Anti-Virus Solution
  • Feature image 1
    Configure and validate Exclusions for Microsoft Defender Antivirus scans Anti-Virus Solution
  • VMware Aria
    VMSA-2022-0026: An arbitrary file read vulnerability in VMware Aria Operations Security | Vulnerability Scans and Assessment
  • 5rgh65436
    New Windows 11 encryption features and security enhancements for Hybrid Work Security | Vulnerability Scans and Assessment
  • 1 8y62mmvjlr 5uovgoq6zmq
    How to download and install DriveLock on Windows Security | Vulnerability Scans and Assessment
  • banner
    How to Secure your API key in Postman Password Manager

More Related Articles

Featured image Windows Security How to clear Cache and Manually Update Microsoft Defender Anti-Virus Solution
Feature image 1 Configure and validate Exclusions for Microsoft Defender Antivirus scans Anti-Virus Solution
VMware Aria VMSA-2022-0026: An arbitrary file read vulnerability in VMware Aria Operations Security | Vulnerability Scans and Assessment
5rgh65436 New Windows 11 encryption features and security enhancements for Hybrid Work Security | Vulnerability Scans and Assessment
1 8y62mmvjlr 5uovgoq6zmq How to download and install DriveLock on Windows Security | Vulnerability Scans and Assessment
banner How to Secure your API key in Postman Password Manager

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • offload apps
    How to automatically offload unused Apps on iPhone Mac
  • Installing Jenkins
    How to Install and Configure Jenkins on Windows 11 Configuration Management Tool
  • AppLocker
    Fix unable to start the Application Identity Service Windows
  • featurekube
    How to Install and Use Minikube on a Linux System Containers
  • stopsappsfromstart
    How to Hide or Stop Apps Like OneDrive from Auto-Opening Mac
  • cisco asa 5510
    Copying TFTP Image to Flash Network | Monitoring
  • preometheus
    Monitoring Synology with Prometheus and Grafana Reviews
  • image 1
    Install and License Devolutions Remote Desktop Manager on Mac Mac

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,832 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.