CVE-2023-50430

The Goodix Fingerprint Device, as shipped in Dell Inspiron 15 computers, does not follow the Secure Device Connection Protocol (SDCP) when enrolling via Linux, and accepts an unauthenticated configuration packet to select the Windows template database, which allows bypass of Windows Hello authentication by enrolling an attacker's fingerprint.
References
Link Resource
https://blackwinghq.com/blog/posts/a-touch-of-pwn-part-i/ Exploit Technical Description Third Party Advisory
https://blackwinghq.com/blog/posts/a-touch-of-pwn-part-i/ Exploit Technical Description Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:goodix:fingerprint_sensor_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:goodix:fingerprint_sensor:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:36

Type Values Removed Values Added
References () https://blackwinghq.com/blog/posts/a-touch-of-pwn-part-i/ - Exploit, Technical Description, Third Party Advisory () https://blackwinghq.com/blog/posts/a-touch-of-pwn-part-i/ - Exploit, Technical Description, Third Party Advisory

13 Dec 2023, 19:10

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-09 22:15

Updated : 2024-11-21 08:36


NVD link : CVE-2023-50430

Mitre link : CVE-2023-50430

CVE.ORG link : CVE-2023-50430


JSON object : View

Products Affected

goodix

  • fingerprint_sensor
  • fingerprint_sensor_firmware
CWE
CWE-287

Improper Authentication