Security researchers have detected a vulnerability in YubiKey two-factor authentication tokens that enables attackers to clone the device according to a new security advisory. The vulnerability was discovered within the Infineon cryptographic library used by most YubiKey products, including the YubiKey 5, Yubikey Bio, Security Key, and YubiHSM 2 series devices.
YubiKey manufacturer Yubico says the severity of the side-channel vulnerability is “moderate” but is difficult to exploit, partly because two-factor systems rely upon something the user has and something only they should know.
“The attacker would need physical possession of the YubiKey, Security Key, or YubiHSM, knowledge of the accounts they want to target, and specialized equipment to perform the necessary attack,” the company said in its security advisory. “Depending on the use case, the attacker may also require additional knowledge including username, PIN, account password, or authentication key.” But those aren’t necessarily deterrents to a highly motivated individual or state-sponsored attack.
As YubiKey firmware can’t be updated, all YubiKey 5 devices before version 5.7 (or 5.7.2 for the Bio series and 2.4.0 for YubiHSM 2) will remain vulnerable forever. Later model versions aren’t affected as they no longer use the Infineon cryptolibrary. NinjaLab, the security firm that discovered the vulnerability, estimates that it’s existed in Infineon’s top security chips for over 14 years. The researchers believe other devices using the Infineon cryptographic library or Infineon’s SLE78, Optiga Trust M, and Optiga TPM microcontrollers are also at risk.