Sunday, 22 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Security > Some YubiKeys have an unfixable vulnerability that’s hard to exploit
Security

Some YubiKeys have an unfixable vulnerability that’s hard to exploit

Last updated: September 4, 2024 5:57 pm
Published September 4, 2024
Share
Yubico bolsters security with updated YubiKey 5 series devices
SHARE

Safety researchers have detected a vulnerability in YubiKey two-factor authentication tokens that allows attackers to clone the system based on a brand new safety advisory. The vulnerability was found inside the Infineon cryptographic library utilized by most YubiKey merchandise, together with the YubiKey 5, Yubikey Bio, Safety Key, and YubiHSM 2 sequence gadgets.

YubiKey producer Yubico says the severity of the side-channel vulnerability is “reasonable” however is troublesome to use, partly as a result of two-factor methods depend upon one thing the consumer has and one thing solely they need to know. 

“The attacker would wish bodily possession of the YubiKey, Safety Key, or YubiHSM, data of the accounts they need to goal, and specialised tools to carry out the required assault,” the corporate mentioned in its safety advisory. “Relying on the use case, the attacker can also require further data together with username, PIN, account password, or authentication key.” However these aren’t essentially deterrents to a extremely motivated particular person or state-sponsored assault.

As YubiKey firmware can’t be up to date, all YubiKey 5 gadgets earlier than model 5.7 (or 5.7.2 for the Bio sequence and a pair of.4.0 for YubiHSM 2) will stay weak ceaselessly. Later mannequin variations aren’t affected as they now not use the Infineon cryptolibrary. NinjaLab, the safety agency that found the vulnerability, estimates that it is existed in Infineon’s high safety chips for over 14 years. The researchers consider different gadgets utilizing the Infineon cryptographic library or Infineon’s SLE78, Optiga Belief M, and Optiga TPM microcontrollers are additionally in danger.

Source link

See also  CoreWeave to Buy Core Scientific in $9B Stock Deal
TAGGED: exploit, hard, unfixable, vulnerability, YubiKeys
Share This Article
Twitter Email Copy Link Print
Previous Article 2024 Millennium Technology Prize Winner Talks Transistors, Innovations, and Data Center Sustainability 2024 Millennium Technology Prize Winner Talks Transistors, Innovations, and Data Center Sustainability
Next Article Navigating the Surge in Energy Demand and Grid Challenges Navigating the Surge in Energy Demand and Grid Challenges
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

With the Chip War Raging, Data Centers Must Take Note

Knowledge heart house owners face a rising problem. As geopolitical tensions escalate over the ‘chip…

February 11, 2025

How to avoid drowning in data at the expense of freshwater supplies

TechBuyer’s Astrid Wynne argues that as AI drives up cooling demand, water stewardship should turn…

February 1, 2026

GAM takes aim at “context rot”: A dual-agent memory architecture that outperforms long-context LLMs

For all their superhuman energy, at present’s AI fashions undergo from a surprisingly human flaw:…

December 6, 2025

Chainguard Raises $140M in Series C Funding

Chainguard, a Kirkland, WA-based software program safety firm, raised $140M in Collection C funding, at…

July 25, 2024

Cloud offers legitimacy as regulators hunt imposters

Actual information centres energy the blockchain, but a shadow trade mimics them, promising unimaginable returns.…

January 2, 2026

You Might Also Like

A photograph of a row of Ethernet cables plugged into ports, with a warning sign illuminated above one of the ports.
Global Market

Telnet vulnerability opens door to remote code execution as root

By saad
Panoramic high speed technology in big city concept, light abstract background.
Global Market

Western Digital wants to ramp-up hard disk drive speeds

By saad
State-Sponsored Hackers Exploit AI in Cyberattacks: Google
AI

State-Sponsored Hackers Exploit AI in Cyberattacks: Google

By saad
Cisco
Global Market

Cisco identifies vulnerability in ISE network access control devices

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.