Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » Security researchers bypass Windows Hello with fake fingerprints with Raspberry Pi 4
  • EC2 Public IP
    How to Allocate, Associate, Disassociate and Release Elastic IP Address from an EC2 Instance AWS/Azure/OpenShift
  • 0227 15
    How to set Execution Policy via Windows PowerShell Windows Server
  • Featured image 3
    How to fix White Screen in Microsoft Teams Windows
  • Screenshot 2022 04 02 at 23.08.25
    How to stop Docker from automatically starting on Mac Mac
  • nodejs install on ubuntu
    How to install Node.js on Ubuntu Linux
  • BitRecDelegation
    Delegate control for BitLocker recovery keys in Active Directory Windows
  • windows 10 bjw3 1280x720 1
    How to Find the Pathname of a Mapped Network Drive Windows
  • HyperV 2
    Fix no disks suitable for the cluster were found Windows Server

Security researchers bypass Windows Hello with fake fingerprints with Raspberry Pi 4

Posted on 27/11/202318/09/2024 Christian By Christian No Comments on Security researchers bypass Windows Hello with fake fingerprints with Raspberry Pi 4
Windows Hello with fake fingerprints

Security researchers discovered vulnerabilities in the fingerprint sensors of some Windows PCs. These could be exploited to bypass Windows Hello’s biometric fingerprint login. The affected sensors manufactured by Elan, Googix, and Synaptics, all use a match-on-chip (MoC) design where the biometric test occurs within a shielded microprocessor on the chip itself. In this article, we will discuss “Security researchers bypass Windows Hello with fake fingerprints with Raspberry Pi 4”. Please see All you need to know before deploying Windows Hello for Business Key and Certificate Trust.

During tests on laptops such as Dell Inspiron 15, Microsoft Surface Pro X, and Lenovo ThinkPad T14, researchers successfully exploited vulnerabilities using a Raspberry Pi 4 with Linux and man-in-the-middle tools.

Please see this YouTube video for more information.

They demonstrated how security researchers could bypass Windows Hello using fake fingerprints and were able to decrypt the TLS protocol of the Synaptics sensor and replay it with modifications.

Please see “Network cable Unplugged: Fix VMware “Warning – Multiple default gateways are intended to provide redundancy to a single network“. Also, see how to Harden your Veeam Backup Server with Microsoft AppLocker.

Unplug Sensors

In some cases, attackers could unplug the fingerprint sensors on Dell and Lenovo laptops and connect their manipulated sensors.

The research raises questions about Microsoft's oversight, as SDCP protection wasn't checked for activation by the fingerprint sensor manufacturers. 

The report doesn’t provide specific solutions for affected users but suggests that a BIOS password may provide some protection since Windows must be running for the described attacks.

Also, see Mitigating ‘PrintNightmare’ Vulnerability: Print Spooler Solutions, how Disable UAC with Group Policy and enable PIN in Windows Hello.

Recommendations by Security Experts to mitigate Windows Hello

Secure Device Connection Protocol (SDCP) protection mechanism has been implemented by Microsoft to prevent unauthorized access. This helps close the vulnerabilities that allowed security researchers to bypass Windows Hello with fake fingerprints.

The researchers recommend that fingerprint sensor manufacturers enable SDCP and undergo third-party security audits for their implementations.

It remains unclear whether the identified security issues can be entirely addressed through software updates.

I hope you found this post very useful. Kindly share your thoughts in the comment section below.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment Tags:Microsoft Windows, security, Windows 10, Windows 11, Windows Security, Windows Server 2016

Post navigation

Previous Post: How to Disable Integrated Graphics on Windows
Next Post: How to Grant Local Admin Permissions to a Group [Part 1]

Related Posts

  • drivelock 1280x720 1
    The server could not be reached or validated: Timeout expired. The Time out expired prior to obtaining a connection from the pool Security | Vulnerability Scans and Assessment
  • Private and Public networks in Windows to VPN
    The differences between Private and Public networks in Windows to VPN? Network | Monitoring
  • Feature image LSA
    How to configure additional LSA Protection Security | Vulnerability Scans and Assessment
  • Feature image DEP
    Disable Data Execution Prevention and determine that hardware DEP is available and configured Security | Vulnerability Scans and Assessment
  • How to upgrade Trellix ePolicy Orchestrator
    How to upgrade Trellix ePolicy Orchestrator Security | Vulnerability Scans and Assessment
  • Trellix configurations after ePo setup
    ePO Server Settings: Trellix ePO AD integration and ENS Agents Installation Security | Vulnerability Scans and Assessment

More Related Articles

drivelock 1280x720 1 The server could not be reached or validated: Timeout expired. The Time out expired prior to obtaining a connection from the pool Security | Vulnerability Scans and Assessment
Private and Public networks in Windows to VPN The differences between Private and Public networks in Windows to VPN? Network | Monitoring
Feature image LSA How to configure additional LSA Protection Security | Vulnerability Scans and Assessment
Feature image DEP Disable Data Execution Prevention and determine that hardware DEP is available and configured Security | Vulnerability Scans and Assessment
How to upgrade Trellix ePolicy Orchestrator How to upgrade Trellix ePolicy Orchestrator Security | Vulnerability Scans and Assessment
Trellix configurations after ePo setup ePO Server Settings: Trellix ePO AD integration and ENS Agents Installation Security | Vulnerability Scans and Assessment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a

  • EC2 Public IP
    How to Allocate, Associate, Disassociate and Release Elastic IP Address from an EC2 Instance AWS/Azure/OpenShift
  • 0227 15
    How to set Execution Policy via Windows PowerShell Windows Server
  • Featured image 3
    How to fix White Screen in Microsoft Teams Windows
  • Screenshot 2022 04 02 at 23.08.25
    How to stop Docker from automatically starting on Mac Mac
  • nodejs install on ubuntu
    How to install Node.js on Ubuntu Linux
  • BitRecDelegation
    Delegate control for BitLocker recovery keys in Active Directory Windows
  • windows 10 bjw3 1280x720 1
    How to Find the Pathname of a Mapped Network Drive Windows
  • HyperV 2
    Fix no disks suitable for the cluster were found Windows Server

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,836 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

Active Directory AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.