Author Topic: heads up: Yubikey 5 series  (Read 454 times)

0 Members and 1 Guest are viewing this topic.

Offline madiresTopic starter

  • Super Contributor
  • ***
  • Posts: 8211
  • Country: de
  • A qualified hobbyist ;)
heads up: Yubikey 5 series
« on: November 11, 2024, 06:49:09 pm »
In September security researchers published a paper about a security issue in an Infinion lib used by Yubikey 5 series (firmware version < 5.7). You can read more about it at https://ninjalab.io/eucleak/. The security issue went unnoticed for 14 years! Since you can't perform a firmware update on Yubikeys for security reasons all 5 series keys with a firmware older than 5.7 should be considered insecure, i.e. e-waste. There are reports that Yubikey still sells 5 series keys with the old firmware (https://blog.fefe.de/?ts=99ccc8dc, in German). If you buy a Yubikey 5 series make sure you get one with a new firmware. Yubikey's stance on that issue is very disappointing.
 
The following users thanked this post: bingo600, SiliconWizard, cte

Offline ebastler

  • Super Contributor
  • ***
  • Posts: 7318
  • Country: de
Re: heads up: Yubikey 5 series
« Reply #1 on: November 11, 2024, 07:06:07 pm »
[...] you can't perform a firmware update on Yubikeys for security reasons [...]

"Nobody can compromise the security of your YubiKey!

...

We have already taken care of that ourselves."
 
The following users thanked this post: cte

Offline ataradov

  • Super Contributor
  • ***
  • Posts: 11811
  • Country: us
    • Personal site
Re: heads up: Yubikey 5 series
« Reply #2 on: November 11, 2024, 11:36:23 pm »
If you actually read the paper, it is such a non-issue. It requires destruction of the original and hours of processing time. There is no way this can be realistically done in a way the owner would not notice.

It is good to do security research and patch even the most obscure of the issues. But there is no need to panic. The existing devices are plenty safe.

Also, no firmware updates is a requirement for highest levels of certification. This is a feature, not a bug.
« Last Edit: November 11, 2024, 11:43:33 pm by ataradov »
Alex
 

Offline ejeffrey

  • Super Contributor
  • ***
  • Posts: 3984
  • Country: us
Re: heads up: Yubikey 5 series
« Reply #3 on: November 12, 2024, 04:59:39 am »
If you actually read the paper, it is such a non-issue. It requires destruction of the original and hours of processing time. There is no way this can be realistically done in a way the owner would not notice.

It is good to do security research and patch even the most obscure of the issues. But there is no need to panic. The existing devices are plenty safe.

Also, no firmware updates is a requirement for highest levels of certification. This is a feature, not a bug.

I wouldn't quite say it's a non issue.  Especially for situations requiring the "highest levels of certification", a cloning attack that takes several hours of offline analysis is still a concern.  But it's definitely not something that most people who are using yubikeys for protecting bank accounts from online phishing attacks should worry about. 

The attack requires someone to get your username and password as well as the security key.  So you are already hacked.  The difference with this attack is that if they return your security key (reassembled) they can retain ongoing access even when you have the security key back in your possession.  That like James Bond stuff, but not an attack most of us need to worry about.  For the attackers most of us have to worry about, if they get access once they are going to do whatever damage they are going to do quickly and conspicuously.
 

Offline ataradov

  • Super Contributor
  • ***
  • Posts: 11811
  • Country: us
    • Personal site
Re: heads up: Yubikey 5 series
« Reply #4 on: November 12, 2024, 05:19:36 am »
The keys are potted, There is no reassembly, they have pictures of the disassembly process in the whitepaper, it is pretty brutal.

A very sophisticated attacker may create a clone device not based on the Infinion device, but behaving entirely identically using extracted private key. They would need to recreate the package too. But this is really out there. Again, something that needs to be fixed, but nothing you should be immediately worried about.

If this is a concern, it might make sense to leave a physical mark on your key that replaced unit will not be able to replicate accurately.
« Last Edit: November 12, 2024, 05:21:30 am by ataradov »
Alex
 

Offline SiliconWizard

  • Super Contributor
  • ***
  • Posts: 15607
  • Country: fr
Re: heads up: Yubikey 5 series
« Reply #5 on: November 13, 2024, 08:20:58 am »
I actually have one of these, and after reading the details, I'm not too concerned indeed. But I'll keep that in mind. That's a key that I'll probably replace and toss at some point, but I see no urgency.
 

Offline Halcyon

  • Global Moderator
  • *****
  • Posts: 6047
  • Country: au
Re: heads up: Yubikey 5 series
« Reply #6 on: November 13, 2024, 09:14:37 am »
I'm not concerned. I'm not about to revoke all the older Yubikeys in my organisation because of this. The attack vector is so implausible, in that, if an attacker manages to pull it off and successfully authenticate, you have bigger problems.

I stand by my comment so much that I actually put my own name and reputation against it in a public forum (not this one; LinkedIn)
 


Share me

Digg  Facebook  SlashDot  Delicious  Technorati  Twitter  Google  Yahoo
Smf