BugTraq
RSA SecurID SID800 Token vulnerable by design Sep 07 2006 06:49PM
hadmut danisch de (Hadmut Danisch) (2 replies)
Hi,

I recently tested an RSA SecurID SID800 Token
http://www.rsasecurity.com/products/securid/datasheets/SID800_DS_0205.pd
f

The token is bundled with some windows software designed to make
user's life easier. Interestingly, this software provides a function
which directly copies the current token code into the cut-and-paste
buffer, when the token is plugged in into USB. This is weak by design.

The security of these tokens is based on what RSA calls "two-factor
user authentication": It takes both a secret (PIN) and the
time-dependend Token-Code to authenticate. The security of the
Token-Code depends on the assumption that the token is resistant
against malware or intruders on the computer used for communication
(web browser, VPN client,...).

However, if the Token Code can be read over the USB bus, this
assumption does not hold. A single attack on the PC where the token is
plugged in would compromise both the PIN (e.g. with a keylogger) and
the token itself (e.g. writing a daemon which continuously polls the
token and forwards the token in real time to a remote attacker.

Ironically this could make an attack even easier: If some malware
simultaneously monitors the token and the keyboard, it is much easier
to detect that the keystrokes are actually related to some login
procedure:

Whenever the 6-digit token code appears in the keyboard or
cut-and-paste input stream, you can be pretty sure that in a sliding
window of about the last 100-200 keystrokes both the PIN and the
address of the server to login is contained. Makes it really easy to
automatically detect secrets in the input stream.

Thus, two different authentication methods are together weaker than
each single one.

regards
Hadmut

[ reply ]
Re: RSA SecurID SID800 Token vulnerable by design Sep 09 2006 09:41AM
3APA3A (3APA3A SECURITY NNOV RU) (2 replies)
Re: RSA SecurID SID800 Token vulnerable by design Sep 09 2006 10:51PM
Bojan Zdrnja (bojan zdrnja gmail com) (2 replies)
Re[2]: RSA SecurID SID800 Token vulnerable by design Sep 11 2006 11:54AM
3APA3A (3APA3A SECURITY NNOV RU)
RE: [Full-disclosure] Re: RSA SecurID SID800 Token vulnerable by design Sep 10 2006 02:27AM
Lyal Collins (lyal collins key2it com au)
Re: [Full-disclosure] Re: RSA SecurID SID800 Token vulnerable by design Sep 09 2006 02:12PM
Brian Eaton (eaton lists gmail com) (1 replies)
Re[3]: RSA SecurID SID800 Token vulnerable by design Sep 11 2006 02:55PM
3APA3A (3APA3A SECURITY NNOV RU) (1 replies)
Re: Re[3]: RSA SecurID SID800 Token vulnerable by design Sep 11 2006 03:35PM
Brian Eaton (eaton lists gmail com) (1 replies)
Re[5]: RSA SecurID SID800 Token vulnerable by design Sep 11 2006 04:16PM
3APA3A (3APA3A SECURITY NNOV RU)
Re: RSA SecurID SID800 Token vulnerable by design Sep 08 2006 10:33PM
Bojan Zdrnja (bojan zdrnja gmail com)


 

Privacy Statement
Copyright 2010, SecurityFocus