A critical vulnerability has been found in far more than 10 devices that use biometric identification to control access to secured spots.
The flaw can be exploited to unlock doorways and open up turnstiles, giving attackers a way to bypass biometric ID checks and physically enter managed areas. Acting remotely, danger actors could use the vulnerability to run instructions devoid of authentication to unlock a door or turnstile or induce a terminal reboot so as to induce a denial of support.
Favourable Technologies researchers Natalya Tlyapova, Sergey Fedonin, Vladimir Kononovich, and Vyacheslav Moskvin uncovered the flaw, which impacts 11 biometric identification devices made by IDEMIA.
Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
The team reported that the impacted devices are in use in the “world’s premier monetary institutions, universities, healthcare corporations, and critical infrastructure amenities.”
The critical vulnerability (VU-2021-004) has acquired a score of 9.1 out of 10 on the CVSS v3 scale, with 10 becoming the most critical.
“The vulnerability has been determined in several strains of biometric readers for the IDEMIA ACS [access control system] equipped with fingerprint scanners and mixed gadgets that analyze fingerprints and vein patterns,” reported Vladimir Nazarov, head of ICS Security at Good Technologies.
He additional: “An attacker can possibly exploit the flaw to enter a safeguarded spot or disable access command programs.”
The IDEMIA units impacted by the vulnerability are MorphoWave Compact MD, MorphoWave Compact MDPI, MorphoWave Compact MDPI-M, VisionPass MD, VisionPass MDPI, VisionPass MDPI-M, SIGMA Lite (all versions), SIGMA Lite+ (all variations), SIGMA Large (all variations), SIGMA Extreme, and MA VP MD.
Enabling and correctly configuring the TLS protocol in accordance to Area 7 of the IDEMIA Safe Set up Guidelines will remove the vulnerability.
IDEMIA has mentioned it will make TLS activation mandatory by default in long run firmware variations.
This isn’t really the initial time Positive Technologies researchers have found a flaw in IDEMIA products. In July 2021, IDEMIA mounted 3 buffer overflow and path traversal vulnerabilities identified by the cybersecurity firm’s crew.
Beneath sure situations, these prior vulnerabilities allowed an attacker to execute code, or to acquire examine and compose obtain to any file from the product. IDEMIA unveiled firmware updates to mitigate the security vulnerabilities.
Some elements of this article are sourced from:
www.infosecurity-magazine.com