The Goodix Fingerprint Device, as shipped in Dell Inspiron 15 computers, does not follow the Secure Device Connection Protocol (SDCP) when enrolling via Linux, and accepts an unauthenticated configuration packet to select the Windows template database, which allows bypass of Windows Hello authentication by enrolling an attacker's fingerprint.
References
Link | Resource |
---|---|
https://blackwinghq.com/blog/posts/a-touch-of-pwn-part-i/ | Exploit Technical Description Third Party Advisory |
https://blackwinghq.com/blog/posts/a-touch-of-pwn-part-i/ | Exploit Technical Description Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:36
Type | Values Removed | Values Added |
---|---|---|
References | () https://blackwinghq.com/blog/posts/a-touch-of-pwn-part-i/ - Exploit, Technical Description, Third Party Advisory |
13 Dec 2023, 19:10
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-09 22:15
Updated : 2024-11-21 08:36
NVD link : CVE-2023-50430
Mitre link : CVE-2023-50430
CVE.ORG link : CVE-2023-50430
JSON object : View
Products Affected
goodix
- fingerprint_sensor
- fingerprint_sensor_firmware
CWE
CWE-287
Improper Authentication