New issue
Advanced search Search tips

Issue 608456 link

Starred by 1 user

Issue metadata

Status: WontFix
Owner: ----
Closed: May 2016
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: ----
Type: Bug



Sign in to add a comment

Security: 2-factor bypass chromebooks

Reported by jjboll...@gmail.com, May 2 2016

Issue description

VULNERABILITY DETAILS
2-factor bypass all chromebooks.

VERSION
Version 49.0.2623.112
Platform 7834.70.0 (Official Build) stable-channel nyan_blaze
Firmware Google_Nyan_Blaze.5771.63.0

REPRODUCTION CASE
Use a Google account with 2-factor authentication to login to a chromebook. Logout.
Anyone can now bypass the 2-factor by simply turning off the wifi, logging in, the turning the wifi back on.
You now have full access to the account.Their are not prevention methods, to stop this from happening on a managed chrome book.
 

Comment 1 by f...@chromium.org, May 6 2016

Cc: kerrnel@chromium.org
Labels: OS-Chrome
kerrnel, do you know anything about 2FA on CrOS?
Cc: rickyz@chromium.org jsc...@chromium.org
Components: Security
Labels: -Type-Bug-Security -Restrict-View-SecurityTeam Type-Bug
This is an example of a physically local attack, and as such it isn't considered in Chrome's threat model. See https://www.chromium.org/Home/chromium-security/security-faq#TOC-Why-aren-t-physically-local-attacks-in-Chrome-s-threat-model- for more information.

That said, this may still be a bug. Does anyone on the cc list have an idea of who a good owner might be? I'm at a bit of a loss here.

Comment 3 by jsc...@chromium.org, May 10 2016

Status: WontFix (was: Unconfirmed)
It's not a physically local attack. It's just confusion about what the second factor is protecting. Specifically, the second factor is used to authenticate the user's session on that device to the remote server. That's why the second factor is required to initially log into the device, but not for later logins (so long as the user's profile hasn't been removed). 

Comment 4 by jjboll...@gmail.com, May 10 2016

Yes, but on a managed chrome book, their is no way to remove your account. So any managed Chrome books that you login to, all have 2F (almost) permanently bypassable.

Comment 5 by jsc...@chromium.org, May 10 2016

It's not bypassable, because the second factor was never required to access the device in the first place. As I explained in the previous comment, the second factor is used to authenticate to the remote server, not the device.

Put another way, if you have the user's password and physical access to the device, then you already have everything you need to decrypt the user's stateful partition. So, requiring a second factor to log back in would just be adding theater.

Sign in to add a comment