Jump in the discussion.

No email address required.

>The attacker would need physical possession of the YubiKey, Security Key, or YubiHSM, knowledge of the accounts they want to target, and specialized equipment to perform the necessary attack. Depending on the use case, the attacker may also require additional knowledge including username, PIN, account password, or authentication key.

Soooooooo, what is the vulnerability here? Not really going to matter to the average user who uses it for 2FA. Corporate datacenters, maybe.

Jump in the discussion.

No email address required.

Link copied to clipboard
Action successful!
Error, please refresh the page and try again.