Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » Security researchers bypass Windows Hello with fake fingerprints with Raspberry Pi 4

Security researchers bypass Windows Hello with fake fingerprints with Raspberry Pi 4

Posted on 27/11/202318/09/2024 Christian By Christian No Comments on Security researchers bypass Windows Hello with fake fingerprints with Raspberry Pi 4
Windows Hello with fake fingerprints

Security researchers discovered vulnerabilities in the fingerprint sensors of some Windows PCs. These could be exploited to bypass Windows Hello’s biometric fingerprint login. The affected sensors manufactured by Elan, Googix, and Synaptics, all use a match-on-chip (MoC) design where the biometric test occurs within a shielded microprocessor on the chip itself. In this article, we will discuss “Security researchers bypass Windows Hello with fake fingerprints with Raspberry Pi 4”. Please see All you need to know before deploying Windows Hello for Business Key and Certificate Trust.

During tests on laptops such as Dell Inspiron 15, Microsoft Surface Pro X, and Lenovo ThinkPad T14, researchers successfully exploited vulnerabilities using a Raspberry Pi 4 with Linux and man-in-the-middle tools.

Please see this YouTube video for more information.

They demonstrated how security researchers could bypass Windows Hello using fake fingerprints and were able to decrypt the TLS protocol of the Synaptics sensor and replay it with modifications.

Please see “Network cable Unplugged: Fix VMware “Warning – Multiple default gateways are intended to provide redundancy to a single network“. Also, see how to Harden your Veeam Backup Server with Microsoft AppLocker.

Unplug Sensors

In some cases, attackers could unplug the fingerprint sensors on Dell and Lenovo laptops and connect their manipulated sensors.

The research raises questions about Microsoft's oversight, as SDCP protection wasn't checked for activation by the fingerprint sensor manufacturers. 

The report doesn’t provide specific solutions for affected users but suggests that a BIOS password may provide some protection since Windows must be running for the described attacks.

Also, see Mitigating ‘PrintNightmare’ Vulnerability: Print Spooler Solutions, how Disable UAC with Group Policy and enable PIN in Windows Hello.

Recommendations by Security Experts to mitigate Windows Hello

Secure Device Connection Protocol (SDCP) protection mechanism has been implemented by Microsoft to prevent unauthorized access. This helps close the vulnerabilities that allowed security researchers to bypass Windows Hello with fake fingerprints.

The researchers recommend that fingerprint sensor manufacturers enable SDCP and undergo third-party security audits for their implementations.

It remains unclear whether the identified security issues can be entirely addressed through software updates.

I hope you found this post very useful. Kindly share your thoughts in the comment section below.

5/5 - (1 vote)

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment Tags:Microsoft Windows, security, Windows 10, Windows 11, Windows Security, Windows Server 2016

Post navigation

Previous Post: How to Disable Integrated Graphics on Windows
Next Post: How to Grant Local Admin Permissions to a Group [Part 1]

Related Posts

  • Uninstall MicrosoftDefenderUpdate
    What you need to know about Microsoft Defender Antivirus Security | Vulnerability Scans and Assessment
  • Disable Open File Security Warnings on Windows
    How to Disable Open File Security Warnings on Windows Security | Vulnerability Scans and Assessment
  • Feature image
    When Should I Use TPM or TPM + PIN Security | Vulnerability Scans and Assessment
  • drivelock 1280x720 1
    The server could not be reached or validated: Timeout expired. The Time out expired prior to obtaining a connection from the pool Security | Vulnerability Scans and Assessment
  • How to stay protected on Windows 10 and11 device with Windows Security
    Stay protected on Windows device with Windows Security Security | Vulnerability Scans and Assessment
  • ext
    How to install Standalone Installation DriveLock Encryption software Security | Vulnerability Scans and Assessment

More Related Articles

Uninstall MicrosoftDefenderUpdate What you need to know about Microsoft Defender Antivirus Security | Vulnerability Scans and Assessment
Disable Open File Security Warnings on Windows How to Disable Open File Security Warnings on Windows Security | Vulnerability Scans and Assessment
Feature image When Should I Use TPM or TPM + PIN Security | Vulnerability Scans and Assessment
drivelock 1280x720 1 The server could not be reached or validated: Timeout expired. The Time out expired prior to obtaining a connection from the pool Security | Vulnerability Scans and Assessment
How to stay protected on Windows 10 and11 device with Windows Security Stay protected on Windows device with Windows Security Security | Vulnerability Scans and Assessment
ext How to install Standalone Installation DriveLock Encryption software Security | Vulnerability Scans and Assessment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • Reload Tabs
    How to Reload all Microsoft Edge Browser Tabs Network | Monitoring
  • windows10update 1
    License file was not found in the specified path (Error 0xc1570103) Windows Server
  • TeamPass Password manager
    Install and configure TeamPass Password Manager Password Manager
  • create a new Azure SQL Database
    How to create a new Azure SQL Database [PaaS] AWS/Azure/OpenShift
  • Add Nutanix AHV to Veeam
    Full Integration Guide on how to Add Nutanix AHV to Veeam Network | Monitoring
  • logon
    Configure logon hours for users in Active Directory Windows Server
  • Test your webcam and microphone before meeting
    How to Test Your Webcam And Microphone Before Meeting Windows
  • Screenshot 2022 03 20 at 21.08.50
    How to integrate AWS CodeBuild and AWS CodeCommit to SonarCloud AWS/Azure/OpenShift

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,808 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.