lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <029956457088b5d675677789593e5db4@riseup.net>
Date: Wed, 15 Jun 2016 11:08:17 +0300
From: omarbv@...eup.net
To: fulldisclosure@...lists.org
Subject: [FD] Face Authentication Bypassing – KeyLemon

Application
-----------
KeyLemon offers convenient, secure and continuous biometric 
authentication solutions based on face and speaker recognition.

To improve robustness to illumination and pose, as well as to provide 
enhanced security against photo/video spoofing attacks, KeyLemon's 
latest face recognition algorithms take full benefit of 3D depth sense 
cameras by efficiently combining depth, near-infrared and color 
information.
(Description from the official website https://www.keylemon.com)


Vulnerability
-------------
Face Authentication Bypassing / Anti-Spoofing Bypassing

It is possible to bypass the face recognition software, just using a 
selfie in the Free version or a gif animation in the Gold License 
version, even with the recognition accuracy set as high.


PoC
---
In the first case, for the FREE desktop application, I created a profile 
in two different scenarios:
- bad conditions (wearing glasses and low light)
- good conditions (no glasses and great lighting)

All I used was an iPhone and the front camera to shoot a selfie, and in 
both scenarios I was able to enter in my session without problem.
Video recorded showing how the FREE version can be bypassed with a 
selfie: https://www.youtube.com/watch?v=wPuVUj5mRgI

In the second case, the GOLD version, I set up the Security Level to 
high, and selected the anti-spoofing check.

There were two different ways to get the blinking "effect":
- using a video (with the iPhone front camera I recorded an 8 seconds 
video)
- using a gif (with the iPhone front camera, I shooted two photos: one 
selfie with eyes open, another selfie with closed eyes and used Best 
Animation Maker, as GIF maker)

Video recorded showing how the GOLD version can be bypassed with a gif 
or video: https://www.youtube.com/watch?v=pCaEJoch6Zc

More information and steps:
https://www.omarbv.com/?p=4676&lang=en


Affected versions
-----------------
KeyLemon 2.7.5 for Mac OS X
KeyLemon 3.2.3 for Windows Vista/7/8
(Older versions are also vulnerable.)


Timeline
--------
2016-05-24: Initial disclosure to vendor
2016-05-24: Vendor responded with “KeyLemon introduced since version 2.5 
antispoofing check feature. This feature requires GOLD package.”
2016-06-06: Vendor was contacted again, regarding the vulnerability in 
the GOLD version.
2016-06-07: Vendor responded with “In the current case, you are fully 
cooperating with the system to spoof it. This is similar as if you give 
your password. In KeyLemon desktop application we decided of a threshold 
between security and convenience.“
2016-06-13: Public disclosure


Discovered by
-------------
Omar Benbouazza
www.omarbv.com
@omarbv

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ