Breaking WebAuthn, FIDO2, and Forging Passkeys

21 vmfunc 4 6/20/2025, 4:55:39 PM nullpt.rs ↗

Comments (4)

rlpb · 5h ago
I'm not sure what this "breaks". Unless a site requires attestation and validates that attestation, a bad software FIDO2 implementation will leave users vulnerable should they choose to use one.

Didn't we already know this?

nullpt_rs · 3h ago
"breaking" might've been a strong verb here. updated post title to better reflect the intentions of the post :)
vmfunc · 4h ago
geoctl · 3h ago
Great effort. I honestly doubt that any B2C or even the vast majority of B2B relying parties do verification of attestation statements during registration which means the relying party never really knows whether the authenticator's public key is actually generated by a real security key, TPM, etc... or just generated by software. I guess FIDO MDS can currently act as a solution to some degree but it might possibly break passkeys legitimately generated by software such as password managers, not to mention that when it comes to TPMs for example, the process is messy and unpredictable. Many TPMs don't even send their own entire x5c because of size and storage limitations.