• tkw8@lemm.ee
    ·
    16 days ago

    Is this because FIDO2 is flawed, the yubikey hardware design is flawed or both?

    • harsh3466@lemmy.ml
      ·
      16 days ago

      It’s due to a cryptographic library implementation in a controller used in the yubikey. It’s a third party controller, and this isn’t exclusive to yubikeys either, a shitload of other stuff uses the same controller and is likely vulnerable to the same attack.

      Also, the attack requires around $10k worth of equipment and physical access to the yubikey, so while a valid attack vector, it’s also not something to get into a panic about.

      • BrikoX@lemmy.zip
        hexagon
        ·
        16 days ago

        It's definitely not something a regular user should panic over. But it's a huge deal since a lot of high security, sensitive targets also rely on the same library.

        • harsh3466@lemmy.ml
          ·
          16 days ago

          Definitely. Not to be ignored, but for lots of yubikey users, also not something to be overly worried about.

      • socsa@piefed.social
        ·
        16 days ago

        It's pretty concerning if my backup key can just be cloned that easily. It means now I need to invest in a much better safe, which I guess was probably always a good idea.

        • smeg@feddit.uk
          ·
          16 days ago

          if my backup key can just be cloned that easily

          Do you consider $10,000 of equipment plus breaking your safe and extracting your pin to be easy? Who did you get on the wrong side of!?

    • BrikoX@lemmy.zip
      hexagon
      ·
      edit-2
      16 days ago

      While the researchers have confirmed all YubiKey 5 series models can be cloned, they haven’t tested other devices using the microcontroller, such as the SLE78 made by Infineon and successor microcontrollers known as the Infineon Optiga Trust M and the Infineon Optiga TPM. The researchers suspect that any device using any of these three microcontrollers and the Infineon cryptographic library contains the same vulnerability.

      Both. The cryptographic library in question is also used in other cryptographic applications too, so it's a huge mess.