Friday, 17 Apr 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Security > Some YubiKeys have an unfixable vulnerability that’s hard to exploit
Security

Some YubiKeys have an unfixable vulnerability that’s hard to exploit

Last updated: September 4, 2024 5:57 pm
Published September 4, 2024
Share
Yubico bolsters security with updated YubiKey 5 series devices
SHARE

Safety researchers have detected a vulnerability in YubiKey two-factor authentication tokens that allows attackers to clone the system based on a brand new safety advisory. The vulnerability was found inside the Infineon cryptographic library utilized by most YubiKey merchandise, together with the YubiKey 5, Yubikey Bio, Safety Key, and YubiHSM 2 sequence gadgets.

YubiKey producer Yubico says the severity of the side-channel vulnerability is “reasonable” however is troublesome to use, partly as a result of two-factor methods depend upon one thing the consumer has and one thing solely they need to know. 

“The attacker would wish bodily possession of the YubiKey, Safety Key, or YubiHSM, data of the accounts they need to goal, and specialised tools to carry out the required assault,” the corporate mentioned in its safety advisory. “Relying on the use case, the attacker can also require further data together with username, PIN, account password, or authentication key.” However these aren’t essentially deterrents to a extremely motivated particular person or state-sponsored assault.

As YubiKey firmware can’t be up to date, all YubiKey 5 gadgets earlier than model 5.7 (or 5.7.2 for the Bio sequence and a pair of.4.0 for YubiHSM 2) will stay weak ceaselessly. Later mannequin variations aren’t affected as they now not use the Infineon cryptolibrary. NinjaLab, the safety agency that found the vulnerability, estimates that it is existed in Infineon’s high safety chips for over 14 years. The researchers consider different gadgets utilizing the Infineon cryptographic library or Infineon’s SLE78, Optiga Belief M, and Optiga TPM microcontrollers are additionally in danger.

Source link

See also  Container Security in the Cloud: Understanding Concepts, Requirements | DCN
TAGGED: exploit, hard, unfixable, vulnerability, YubiKeys
Share This Article
Twitter Email Copy Link Print
Previous Article 2024 Millennium Technology Prize Winner Talks Transistors, Innovations, and Data Center Sustainability 2024 Millennium Technology Prize Winner Talks Transistors, Innovations, and Data Center Sustainability
Next Article Navigating the Surge in Energy Demand and Grid Challenges Navigating the Surge in Energy Demand and Grid Challenges
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

DigitalBridge appoints new senior advisor By Investing.com

© Reuters. BOCA RATON, Fla. - DigitalBridge Group, Inc. (NYSE: DBRG), a global digital infrastructure…

February 9, 2024

Can AI make data centres greener?

Peter Schwartz, Senior Expertise Marketing consultant at OryxAlign, explores how operators can use AI, fashionable…

January 24, 2026

SoundHound AI Acquires Amelia

SoundHound AI (Nasdaq: SOUN), a Santa Clara, CA-based voice synthetic intelligence firm, acquired Amelia, a…

August 9, 2024

Engineered skin tissue grants robots special properties and abilities

The engineered pores and skin tissue and the best way it adheres to the underlying…

June 26, 2024

Whisper Raises $1M in Funding

Whisper, a NYC-based firm creating AI-driven gross sales and behavioral cloning expertise for content material…

March 4, 2025

You Might Also Like

A photograph of a row of Ethernet cables plugged into ports, with a warning sign illuminated above one of the ports.
Global Market

Telnet vulnerability opens door to remote code execution as root

By saad
Panoramic high speed technology in big city concept, light abstract background.
Global Market

Western Digital wants to ramp-up hard disk drive speeds

By saad
State-Sponsored Hackers Exploit AI in Cyberattacks: Google
AI

State-Sponsored Hackers Exploit AI in Cyberattacks: Google

By saad
Cisco
Global Market

Cisco identifies vulnerability in ISE network access control devices

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.