what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Face Recognition Authentication Fail

Face Recognition Authentication Fail
Posted Dec 9, 2008
Authored by SVRT | Site security.bkis.vn

The face recognition authentication mechanism in Lenovo, Asus, and Toshiba laptops suffers from a bypass vulnerability.

tags | advisory, bypass
SHA-256 | af4826555c3f1216ccef140a9ee97e90f1bd689835fef766d6a4543d535d16b8

Face Recognition Authentication Fail

Change Mirror Download
VULNERABILITY IN FACE RECOGNITION AUTHENTICATION MECHANISM
LENOVO-ASUS-TOSHIBA LAPTOPS

1. General Information

Face Recognition feature is provided by Asus, Lenovo and Toshiba as
specialized software that is issued together with their laptops. This
feature is embedded into all laptop families having webcams and supporting
Windows Vista, XP operating system. Owners of laptops benefiting from this
technology do not have to type in their passwords or use their fingerprint
but to sit in front of their laptops to login.

Face-recognition is introduced by these vendors as a remarkable feature
which helps prevent unauthorized people breaking into laptops and ensure
information security for their owners.

Details : http://security.bkis.vn/?p=292
SVRT Advisory : SVRT-07-08
Initial vendor notification : 20-11-2008
Release Date : 08-12-2008
Update Date : 08-12-2008
Discovered by : SVRT-Bkis
Attack Type : Authentication Mechanism Bypass
Security Rating : Critical
Impact : Loss of Confidentiality and Integrity
Affected Software : Lenovo Veriface III (prior version is vulnerable)
Asus SmartLogon V1.0.0006 (prior version is
vulnerable)
Toshiba Face Recognition 2.0.2.32 (prior
version is vulnerable)

Video demo:
http://security.bkis.vn/Proof-of-concept/Face_Recognition/FaceRecognitionBypassing_DemoVideo.wmv

2. Technical Description

After 4 months researching on Face Recognition technology apply on laptop,
Bkis, Vietnam, has come to a conclusion that the User Authentication
Mechanisms Based on Face Recognition of Asus, Lenovo and Toshiba haven't met
security needs.

Bkis research show that the Authentication Mechanism Based on
Face-Recognition of these 3 laptop vendors can all be bypassed, even when
set at highest security level.

In order to make use of this technology, a laptop's owner uses webcam to
capture his or her face at a close distance and at different viewpoints.
This step helps the laptop to "remember" facial characteristics of its
owner, and store these data in the face database. Bkis's research, however,
show that an unauthorized person can easily regenerate suite of fake face
recognition to bypass the authentication mechanism.

Performing tests on laptops with 1.3 Megapixel camera produced by Lenovo -
Asus - Toshiba, using the Bypass Model above with special photos or videos
of some users, we have been able to pass the User Authentication Based on
Face Recognition and log into user accounts on Windows Vista without
difficulty.

All the applications tested are of their latest versions and are set to
Highest Security Level.
- Lenovo Veriface III
- Asus SmartLogon V1.0.0005
- Toshiba Face Recognition 2.0.2.32

3. Solution

In the mean time waiting for this vulnerability to be fixed, Bkis recommends
that users all over the world stop using face authentication to log in their
laptops.

Credit
Thanks Le Nhat Minh, Nguyen Minh Duc, Bui Quang Minh, Le Minh Hung.

----------------------------------------------------------------
Security Vulnerability Research Team (SVRT-Bkis)

Bach Khoa Internetwork Security Center (Bkis)
Hanoi University of Technology (Vietnam)

Office: 5th Floor, Hitech building - 1A Dai Co Viet, Hanoi, Vietnam
Tel: 84.4.38 68 47 57 Ext 128
Mobile: +84 983 60 99 20
Email: svrt@bkav.com.vn
Website: www.bkav.com.vn
----------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close