EUCLEAK Side-Channel Attack on the YubiKey 5 Series

Website & Resources

  • Several people report the Ninjalab site hanging; workarounds include reader mode, blocking the loading overlay, or using the linked PDF.
  • Links to Yubico’s advisory and support article are shared.

Vulnerability Scope & Requirements

  • Affects YubiKey 5 series with firmware <5.7 using Infineon’s cryptographic library.
  • Exploit is an electromagnetic side-channel on a non-constant-time modular inversion in ECDSA.
  • Requires physical access, disassembly of the key, lab-grade EM equipment, and a few minutes of traces.
  • Once refined, the attack might not require fully destroying the device; current work didn’t focus on re-packaging.

Impact on Security Guarantees

  • Key extraction turns the device from “unextractable secrets” into “very hard-to-extract secrets”.
  • Some argue this is mainly a high-end, targeted attack; others note many YubiKey use cases (crypto, defense, banking) are exactly such high-value targets.
  • Attestation keys can also be cloned, undermining hardware model enforcement and FIDO attestation in some deployments.

Firmware, Mitigations & Replacement Debate

  • YubiKey firmware is not upgradable; old devices remain vulnerable.
  • Earlier Infineon issue (ROCA) led to free replacements; several posters are surprised replacements aren’t offered now.
  • YubiKey 5.7 switches from Infineon to Yubico’s own crypto library; some are nervous about custom crypto, others say it’s reasonable after multiple vendor failures.

Broader Infineon Ecosystem

  • Discussion notes all Infineon secure microcontrollers using the affected crypto library may be vulnerable: TPMs, e-passports, phone secure enclaves, SIMs, some hardware wallets, EMV cards, tachographs, etc.
  • There’s debate about how serious this is for each: some see primarily forensic/government use; others highlight passports, banking apps, and payment systems as significant.

FIDO2, PINs, UV & Passkeys

  • PIN/user verification can often be bypassed because relying parties may request “user verification not required”; thus the side-channel can be driven without PIN knowledge.
  • This can reduce “key + PIN” from two factors to effectively one (possession).
  • Resident (discoverable) vs non-resident credentials matter: resident ones can be attacked offline; non-resident need the credential ID, typically learned via a legitimate challenge.

Usability, Backups & Account Management

  • Major pain point: no easy way to enumerate where a key is registered; users resort to tagging entries in password managers.
  • Many recommend registering multiple keys only on critical services (email, password manager, SSO, cloud) and keeping backups in separate locations.
  • Some lament difficulty of securely backing up or cloning keys; proposals for paired/synchronizable keys are debated as too risky/complex.

Crypto Engineering & Certification Critique

  • Infineon is criticized for a non-constant-time primitive; modular inversion leaks are seen as a basic failure.
  • Common Criteria certifications are questioned since the flaw survived ~14 years and many evaluations.
  • Some note this is a known class of attacks; constant-time algorithms, blinding, or using schemes like EdDSA could have mitigated it.