(评论)
(comments)

原始链接: https://news.ycombinator.com/item?id=43408674

Hacker News 上的一篇讨论帖围绕 CVE-2024-9956 展开,这是一个可能允许通过在移动浏览器上进行 PassKey 钓鱼来接管账户的漏洞。 一位用户澄清说,攻击本身并没有窃取 PassKey 密码,而是窃取了一个会话。关于 BLE PassKeys 和与攻击者控制的设备配对的问题也随之出现。 至关重要的是,一条评论强调该漏洞是在去年报告的,补丁正在陆续推出。Chrome 最快修复了它(2024 年 10 月),而 Safari 和 Firefox 预计分别在 2025 年 1 月和 3 月修复。不同的响应时间引发了猜测。 最后,一位用户质疑被钓鱼的 WebAuthn 登录的影响,因为攻击者不会获得私钥。关注点在于用户可能在虚假网站上共享其他敏感数据,例如加密货币钱包密钥。


原文
Hacker News new | past | comments | ask | show | jobs | submit login
CVE-2024-9956 – PassKey Account Takeover in All Mobile Browsers (mastersplinter.work)
43 points by rbanffy 9 hours ago | hide | past | favorite | 6 comments










The subheading "Phishing PassKeys credentials using browser intents" is inaccurate. The attacker does not get a credential, only a session.


I don't use BLE PassKeys, but wouldn't the user also have to be paired with the attacker controlled BlueTooth device to get the connection request? Does the "The victim’s Authenticator connects to the attacker’s Client" step's authorization include pairing to a new device and not only allow a log-in with an already connected one?


since not stated in the article and I started to get worried, this was reported last year.

Safari: fixed in 18.3 (Jan 2025)

Firefox: fixed in 136 (March 2025)

Chrome: fixed in 130.0.6723.58/.59 (Oct 2024)

Wow - only Google seemed to really prioritize fixing this / had the processes and manpower to get a fix out quickly.

Mozilla’s bug report is still locked down but Google’s is open: https://issues.chromium.org/issues/370482421



> Wow - only Google seemed to really prioritize fixing this / had the processes and manpower to get a fix out quickly.

I would have guessed they'd be the quickest, but I wouldn't have guessed they'd be months ahead of the others.



Perhaps they had the info before it was disclosed to the others?


I’m missing something. If WebAuthn is “ssh for the web” then why would it matter if Bob was phished and logged into the fake crypto portal running on the raspberry pi? It’s not like the attacker now knows his private key. Is the danger that Bob also would share his crypto wallet keys with the fake site or something?






Join us for AI Startup School this June 16-17 in San Francisco!


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact



Search:
联系我们 contact @ memedata.com