Security researchers reveal vulnerabilities in Windows Hello fingerprint authentication

November 23, 2023 A recent investigation by Blackwing Intelligence, conducted in collaboration with Microsoft’s Offensive Research and Security Engineering group, has uncovered significant vulnerabilities in Windows Hello’s fingerprint authentication system. Presented at Microsoft’s BlueHat conference, the research demonstrated how the fingerprint authentication on certain laptops could be bypassed, potentially allowing unauthorized access.

The vulnerabilities were found in three specific laptop models: a Dell Inspiron 15, a Lenovo ThinkPad T14, and a Microsoft Surface Pro 8/X, each using fingerprint sensors from different manufacturers (Goodix, Synaptics, and ELAN, respectively). The researchers, Jesse D’Aguanno and Timo Teräs, pointed out that these security flaws stem from issues in the communication between the software and hardware, rather than Windows Hello or fingerprint technology itself.

The bypass techniques involved manipulating the fingerprint sensor’s data. In one method, an attacker could use a Linux boot to rewrite the sensor’s data, allowing unauthorized access. Notably, this attack could be executed while the computer is on, using a man-in-the-middle (MITM) device, making it more challenging to prevent.

Despite these vulnerabilities, Blackwing Intelligence clarified that full-disk encryption and BIOS passwords could still provide effective security measures, as exploitation is less feasible if the machine cannot boot to the point where fingerprint authentication is available.

The researchers urged manufacturers to use Secure Device Connection Protocol (SDCP) and properly integrate sensor chips with Windows to address these security gaps. They plan to provide more detailed information about the vulnerabilities they discovered in the future, underscoring the ongoing importance of cybersecurity vigilance in the face of evolving threats.

Sources include: The Register

Top Stories

Related Articles

January 16, 2026 A newly uncovered malware framework suggests attackers are quietly preparing for a much deeper push into Linux more...

January 16, 2026 A massive trove of personal data belonging to thousands of U.S. immigration agents has reportedly been leaked more...

December 30, 2025 A fast-moving cyberattack has compromised more than 59,000 internet-facing Next.js servers in less than two days after more...

December 29, 2025 The U.S. National Institute of Standards and Technology (NIST) has warned that several of its Internet Time more...

Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com
Picture of Jim Love

Jim Love

Jim Love's career in technology spans more that four decades. He's been a CIO and headed a world wide Management Consulting practice. As an entrepreneur he built his own tech business. Today he is a podcast host with the popular tech podcasts Hashtag Trending and Cybersecurity Today with over 14 million downloads. As a novelist, his latest book "Elisa: A Tale of Quantum Kisses" is an Audible best seller. In addition, Jim is a songwriter and recording artist with a Juno nomination and a gold album to his credit. His music can be found at music.jimlove.com

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn