July 3, 2024, 11:39 a.m. |

CSO Online www.csoonline.com






Passkey, a password-less technology for authenticating user access to cloud-hosted applications, may still be vulnerable to adversary-in-the-middle (AitM) attacks despite its massive popularity, according to an eSentire study.


Poor implementation of passkeys, like offering less secure backup authentication methods, can lead to an AitM bypassing the authentication flow by modifying prompts shown to users.


“In the case where passkeys are used as a first-factor authentication method only, the downgraded authentication flow is now vulnerable to AitM,” Joe …

access adversary adversary-in-the-middle aitm applications attack attacks authentication authentication methods backup bypassing can cloud esentire flow implementation may multi-factor authentication passkey passkeys password poor prompts proof study technology vulnerable

System Administrator, Senior

@ Booz Allen Hamilton | USA, NV, Nellis AFB (4370 Washington Blvd)

Staff Systems Engineer

@ Commonwealth Bank | Bengaluru - Manyata Tech Park Road

(IND) Software Engineer III

@ Walmart | IN KA BANGALORE Home Office Building 10

Software Engineer III

@ Walmart | IN KA BANGALORE Home Office Building 11

Systems Engineer - Global Accounts

@ Palo Alto Networks | London, United Kingdom

Principal Support Engineering Specialist - SASE

@ Palo Alto Networks | Bengaluru, India