AGL 38.18 Decreased By ▼ -0.22 (-0.57%)
AIRLINK 142.98 Increased By ▲ 7.98 (5.91%)
BOP 5.07 Decreased By ▼ -0.02 (-0.39%)
CNERGY 3.77 Decreased By ▼ -0.02 (-0.53%)
DCL 7.56 Decreased By ▼ -0.03 (-0.4%)
DFML 44.48 Increased By ▲ 0.03 (0.07%)
DGKC 76.25 Decreased By ▼ -1.15 (-1.49%)
FCCL 26.95 Increased By ▲ 0.07 (0.26%)
FFBL 52.00 Decreased By ▼ -0.97 (-1.83%)
FFL 8.52 Decreased By ▼ -0.02 (-0.23%)
HUBC 125.51 Increased By ▲ 1.71 (1.38%)
HUMNL 9.99 Increased By ▲ 0.05 (0.5%)
KEL 3.74 Increased By ▲ 0.01 (0.27%)
KOSM 8.15 Increased By ▲ 0.07 (0.87%)
MLCF 34.75 Increased By ▲ 1.05 (3.12%)
NBP 58.71 Increased By ▲ 0.22 (0.38%)
OGDC 154.50 Increased By ▲ 4.55 (3.03%)
PAEL 25.15 Increased By ▲ 0.45 (1.82%)
PIBTL 5.93 Increased By ▲ 0.08 (1.37%)
PPL 118.31 Increased By ▲ 6.66 (5.97%)
PRL 24.38 Increased By ▲ 0.48 (2.01%)
PTC 12.00 Decreased By ▼ -0.10 (-0.83%)
SEARL 56.00 Decreased By ▼ -0.89 (-1.56%)
TELE 7.05 Increased By ▲ 0.05 (0.71%)
TOMCL 34.99 Decreased By ▼ -0.16 (-0.46%)
TPLP 6.98 Decreased By ▼ -0.07 (-0.99%)
TREET 13.98 Decreased By ▼ -0.18 (-1.27%)
TRG 46.10 Decreased By ▼ -0.13 (-0.28%)
UNITY 26.00 Decreased By ▼ -0.08 (-0.31%)
WTL 1.21 No Change ▼ 0.00 (0%)
BR100 8,822 Increased By 86.7 (0.99%)
BR30 26,723 Increased By 466.7 (1.78%)
KSE100 83,532 Increased By 810.2 (0.98%)
KSE30 26,710 Increased By 328 (1.24%)

ISLAMABAD: A global cybersecurity company has identified numerous flaws in the hybrid biometric terminal produced by an International Chinese manufacturer.

According to the experts of Kaspersky, by adding random user data to the database or using a fake QR code, a nefarious actor can easily bypass the verification process and gain unauthorized access. The attackers can also steal and leak biometric data, remotely manipulate devices, and deploy backdoors. High-security facilities worldwide are at risk if they use this vulnerable device.

The flaws were discovered in the course of Kaspersky Security Assessment experts’ research into the software and hardware of the company. All findings were proactively shared with the manufacturer prior to public disclosure.

The biometric readers in question are widely used in areas across diverse sectors – from nuclear or chemical plants to offices and hospitals. These devices support face recognition and QR-code authentication, along with the capacity to store thousands of facial templates. However, the newly discovered vulnerabilities expose them to various attacks.

Cybersecurity experts highlighted that attackers can inject specific data into the QR code used for accessing restricted areas. Consequently, they can gain unauthorized access to the terminal and physically access the restricted areas. When the terminal processes a request containing this type of malicious QR code, the database mistakenly identifies it as originating from the most recently authorized legitimate user.

“In addition to replacing the QR code, there is another intriguing physical attack vector. If someone with malicious intent gains access to the device’s database, they can exploit other vulnerabilities to download a legitimate user’s photo, print it, and use it to deceive the device’s camera to gain access to a secured area. This method, of course, has certain limitations. It requires a printed photo, and warmth detection must be turned off. However, it still poses a significant potential threat,” says Georgy Kiguradze, Senior Application Security Specialist at Kaspersky.

Copyright Business Recorder, 2024

Comments

Comments are closed.