Windows Hello vulnerability allows hackers to log in with fake facial photos
Back in May, Microsoft started setting up new accounts as passwordless by default . Instead of typing in a password, the company encouraged users to switch to modern login methods like Passkey or Windows Hello .
However, recently, at the Black Hat security conference in Las Vegas, two researchers Tillmann Osswald and Dr. Baptiste David (from Germany) revealed how the enterprise version of Windows Hello can be cracked, raising an extremely serious security issue.
Direct 'infiltration'
Accordingly, in the demo, David logged into his computer using facial recognition . Then, Osswald – acting as a hacker with local admin rights – only needed to run a few lines of code. He inserted his facial scan (taken on another machine) into the target machine's biometric database . Just a few seconds later, Osswald put his face in front of the camera and… the computer unlocked immediately, mistaking Osswald's face for David's.
How Windows Hello works
When Windows Hello is first set up, the service generates a public/private key pair . The public key is registered with the organization's ID provider (such as Entra ID).
Biometric data (face, fingerprints, etc.) is stored in a database managed by Windows Biometric Service (WBS) , and this database is encrypted. When logging in, the system will match the live scan data with the saved template.
The problem is: in some cases, this layer of encryption cannot prevent an attacker with local admin privileges from decrypting and replacing biometric data.
To overcome this, Microsoft introduced ESS – an enhanced security feature that puts the entire biometric authentication process into an isolated security environment managed by the system's hypervisor.
But ESS only works when the machine meets the hardware requirements including:
- New 64-bit CPU supports hardware virtualization (VBS)
- TPM 2.0 Chip
- Secure Boot enabled in BIOS/UEFI
- Specially certified biometric sensors
Microsoft mandated this feature on the Copilot+ PC line , but many current machines don't have it, especially AMD-based PCs that don't have security camera sensors.
According to researchers Osswald and David, a complete fix is almost impossible without redesigning the entire biometric data storage architecture. Therefore, if you are using Windows Hello without ESS , they recommend disabling biometrics completely and switching to a PIN.
To check if your system supports ESS, go to Settings > Accounts > Sign-in options . If you see the option 'Sign in with external camera or fingerprint reader' :
- Off : ESS is active (but peripherals such as USB fingerprint will not be available).
- On : ESS is disabled (external devices can be used but security is reduced).
Microsoft says some 'Windows Hello compatible' peripherals can enable ESS, but to be safe, they should be plugged in on first boot and not unplugged. Full support for external devices with ESS is not expected until late 2025 .
You should read it
- Detects a vulnerability that threatens all Windows computers shipped from 2012 up to now
- Microsoft proves Windows 10 computers are vulnerable to hacking to advertise Windows 11
- Detecting zero-day vulnerability in the Dropbox 10 Windows app, users pay attention!
- Microsoft admits a new zero-day vulnerability threatens millions of Windows users
- Steps to fix PrintNightmare vulnerability on Windows 10
- Microsoft fixes a serious vulnerability that has existed for 17 years in Windows Server
- Exploit code released puts Windows 10 20H2 and Windows Server 20H2 at risk
- Microsoft has released a critical update for Windows 10, users need to update now
May be interested
- New zero-day vulnerability warning in Windows Search, Windows protocol nightmare getting worsea new windows search vulnerability can be exploited to automatically open a search window containing remotely hosted malicious executable files just by launching a word document.
- The new vulnerability on Intel allows hackers to take control of your computer within 30 secondswhile intel's meltdown and specter vulnerabilities have not been completely overcome, the world faces a new security vulnerability that allows hackers to take complete control of the user's device and attack time within 30 seconds.
- Microsoft urges Admin to patch PowerShell vulnerability on Windowsmicrosoft has just asked for it admins of organizations and businesses to immediately patch the vulnerability in powershell 7. the reason is that this vulnerability allows hackers to bypass windows defender application control (wdac) enforcement measures.
- 12-year vulnerability in pkexec gives hackers root privileges on Linuxresearchers have just issued a warning about a vulnerability in polkit's pkexec component that is assigned the code cve-2021-4034 (and is known as pwnkit).
- 'Printer Catastrophe' Vulnerability Threatens All Versions of Windowsalthough microsoft releases patches for windows vulnerabilities on a monthly basis, there are still security issues that remain. recently, the us cybersecurity and infrastructure agency (cisa) reported a critical vulnerability in the windows print spooler system.
- Serious vulnerability in Microsoft Word is being used by hackers to install malware on computersa zero day vulnerability in microsoft word is being exploited to install malware on windows machines.
- Patches of dangerous vulnerabilities being exploited by hackers contain dangerous holes and then continue to be exploited by hackersnot long after the log4j vulnerability was discovered, the patch was released. however, the irony is that this patch has holes.
- Basic operations to remove fake security softwarerecently, the number of computers infected with fake security software has increased significantly, especially those with 2012 characters included, for example ...
- The new zero-day vulnerability on Windows 10 helps hackers take control of the computerthis is a serious security vulnerability that could allow hackers to attack and gain control of computer devices.
- Trojan attacks on dangerous errors in Windowsan unpatched vulnerability in windows has been confirmed by microsoft that could be exploited by hackers to take control of the new 'favored' trojan system.