Skip to main content

Windows may have a serious security problem on its hands

A finger pressing on a fingerprint reader on a laptop.
Digital Trends

The premier sensors enabling Windows Hello fingerprint authentication are not as secure as manufacturers had hoped. Researchers have discovered security flaws in a number of fingerprint sensors used in several laptops that work with the Windows Hello authentication feature.

Security researchers at Blackwing Intelligence have uncovered that laptops made by Dell, Lenovo, and Microsoft can have their Windows Hello fingerprint authentication bypassed easily due to vulnerabilities in the sensors that can cause them to be taken over by bad actors at the system level.

Recommended Videos

Many of the laptop brands use fingerprint sensors from Goodix, Synaptics, and ELAN. These vulnerabilities are beginning to arise as businesses transition to biometrics as a primary option for accessing devices. As time goes on, password use will continue to diminish. Three years ago, Microsoft claimed that 85% of its users were opting for a Windows Hello sign-in on Windows 10 devices over a password, according to The Verge.

Please enable Javascript to view this content

On request from Microsoft’s Offensive Research and Security Engineering (MORSE), researchers shared details of various attacks that have plagued fingerprint authentication-enabled laptops at the brand’s BlueHat conference in October.

One such attack is a man-in-the-middle (MitM) attack, which can be used to access a stolen laptop. Another method is an “evil maid” attack, which can be used on an unattended device.

Blackwing Intelligence researchers tested a Dell Inspiron 15, Lenovo ThinkPad T14, and Microsoft Surface Pro X, which all fell victim to various bypass methods as long as someone had previously used their fingerprint to access the devices. The researchers noted that the bypassing entailed reverse engineering of the hardware and software on the laptops. They found flaws in the security layer of the Synaptics sensor, in particular. Windows Hello needed to be decoded and restructured to get past its setup, but it was still able to be hacked.

Researchers noted that Microsoft’s Secure Device Connection Protocol (SDCP) is a solid attempt at applying a security measure within the biometric standard. It allows for more secure communication between the biometric sensor and its laptop. However, not all manufacturers implemented the feature well enough for it to be effective, if they enabled it at all. Two out of the three laptops examined in the study had SDCP enabled.

Having more secure biometric laptops won’t only be a task for Microsoft. An initial remedy for securing Windows Hello-enabled laptops is also to have SDCP enabled on the manufacturer’s side, Blackwing Intelligence noted.

This study follows a 2021 facial recognition biometrics flaw in Windows Hello that allowed users to bypass the feature with certain alterations. Microsoft was forced to update its feature after researchers presented a proof of concept showcasing users with masks or plastic surgery bypassing Windows Hello facial recognition authentication.

Fionna Agomuoh
Fionna Agomuoh is a Computing Writer at Digital Trends. She covers a range of topics in the computing space, including…
Windows 11 Recall finally arrives, but with one new problem
Recall screenshot.

The Windows 11 Recall feature has been troublesome since its announcement. Now that the feature is available in a testing capacity, it is still causing users some issues.

Tech reviewers testing the feature have observed that Recall will now fail to save the snapshots that allow the function to work. CNBC noted that it may take “several minutes” for a snapshot to save, which may leave delays in the AI processing. Tom Warren of The Verge, noted on Bluesky that snapshots were not saving at all in his experience.

Read more
Microsoft warns that the latest Windows 11 update may crash PC games now
Gaming PC on a desk.

Microsoft has once again temporarily halted the rollout of its latest major Windows 11 update, also known as 24H2. This time it is for systems running select Ubisoft games following widespread user reports of crashes and performance issues. The affected titles include Assassin's Creed Valhalla, Assassin's Creed Origins, Assassin's Creed Odyssey, Star Wars Outlaws, and Avatar: Frontiers of Pandora.

Common complaints include black screens, freezing, and unresponsiveness during gameplay or while loading these titles. "I just bought a new gaming laptop with RTX 4080, Intel i9 14900hx. I can't play the game (Origins) even for 5 minutes because it crashes to a black screen, with audio, and the only way to close it is from task manager. Impossible to play," one user shared on Reddit. Others reported similar frustrations, citing the persistent error “NTDLL.dll” that renders their games unplayable.

Read more
The Windows 11 24H2 update is causing even more problems
Windows 11 logo on a laptop.

The Windows 11 24H2 update had already been giving users a real headache with problems such as bugs for visual layouts and flaws for certain wallpaper apps. And now, as Microsoft confirms in a support document, some people without administrative privileges can't change the time zone in the Date & Time view, among myriad other issues related to the important Windows 11 update.

A Feedback Hub post also reports a time issue after exiting Sleep Mode, specifically after about one out of every five overnight sleep cycles. There is also a report that the time is not syncing correctly following daylight saving time. Put differently, the update doesn't break the time zone, but only affects the toggle or makes it very difficult to modify it.

Read more