Article Details
Scrape Timestamp (UTC): 2024-09-04 17:51:51.367
Original Article Text
Click to Toggle View
New Eucleak attack lets threat actors clone YubiKey FIDO keys. A new "EUCLEAK" flaw found in FIDO devices using the Infineon SLE78 security microcontroller, like Yubico's YubiKey 5 Series, allows attackers to extract Elliptic Curve Digital Signature Algorithm (ECDSA) secret keys and clone the FIDO device. NinjaLab's Thomas Roche, who discovered the flaw and devised the EUCLEAK side-channel attack, notes that the side channel can retrieve an ECDSA secret key using EM acquisitions. However, the attack requires extended physical access, specialized equipment, and a high level of understanding of electronics and cryptography. These prerequisites significantly mitigate the risk, limiting it mostly to attacks from highly sophisticated, state-sponsored threat actors against high-value targets. With that said, EUCLEAK is not considered a threat to general users, even to those who use theoretically vulnerable devices. Yubico responds to EUCLEAK The flaw impacts YubiKey 5 Series devices running firmware versions older than 5.7.0, which uses Infineon's flawed cryptographic library. The models impacted by EUCLEAK are: The vendor rated the issue as moderate, assigning a CVSS score of only 4.9, which reflects its low risk. Also, Yubico notes in its advisory that attackers attempting to recover credentials from impacted keys would require the user PIN or biometric verification for full exploitation, making successful attacks even harder. YubiKey owners can check the firmware version of the security keys using YubiKey Manager or YubiKey Authenticator. Unfortunately, if you are using a vulnerable version, there is no way to upgrade the firmware to the latest 5.7.0 (YubiKey) or 2.4.0 (YubiHSM) versions to mitigate this flaw. The vendor recommends using RSA signing keys instead of elliptic curve (ECC) signing keys and limiting the maximum session duration from the identity provider settings to require more frequent FIDO authentications. Other impacted products NinjaLab confirmed that EUCLEAK also impacts Infineon TPMs (SLB96xx), used for secure boot, authentication, and cryptographic operations, and Infineon's Optiga Trust M security microcontroller, used in IoT devices. Infineon TPMs are used in the smart enclaves of old (between 2013 and 2018) smartphones and tablets from Samsung and OnePlus, and also some dated (from mid-2010s) laptop models from Lenovo, Acer, Dell, HP, and LG. The Feitian A22 JavaCard, used in smart cards and authentication systems, is also impacted by using the Infineon SLE78 microcontroller. Other potentially impacted devices include e-passports, cryptocurrency hardware wallets (cold wallets), IoT devices, and any FIDO device that uses Infineon's SLE78.
Daily Brief Summary
A newly discovered vulnerability named "EUCLEAK" affects FIDO devices utilizing the Infineon SLE78 security microcontroller, notably including Yubico's YubiKey 5 Series.
The flaw allows sophisticated attackers to extract and clone ECDSA keys from impacted devices through a method that requires significant physical access and highly specialized equipment.
Although EUCLEAK proposes a significant threat in theory, it is largely rated as a moderate risk (CVSS 4.9) due to the requirement for physical access and complex extraction methods.
Affected devices include not only YubiKeys but also Infineon TPMs, Feitian A22 JavaCards, certain older smart devices, and potentially e-passports and cryptocurrency hardware wallets.
Yubico has issued advisories noting that fully exploiting the flaw would also necessitate bypassing additional security measures such as user PINs or biometric data.
YubiKey users with firmware versions below 5.7.0 are encouraged to switch from elliptic curve signature keys to RSA keys and reduce session durations for added security.