The U2F Garden

EUCLEAK and your Yubikey

In September 2024, security researchers at NinjaLab disclosed EUCLEAK, a side channel attack against the Infineon ECDSA library running on the NXP A700x family of secure elements. That family of chips ships inside Yubico’s Yubikey 5 series, the Yubikey 5 FIPS series, the Security Key Series, and the Google Titan keys. Roughly speaking, every popular FIDO2 token built on that platform is in scope.

If you own a Yubikey, you probably saw the headlines and wondered if you needed to throw your key in the trash. The short answer is no. The longer answer is more interesting, and it is worth understanding so you can make a sensible decision about whether to replace your key.

What the attack actually does

EUCLEAK is a side channel attack. The attacker measures electromagnetic emissions from the secure element while the chip performs ECDSA signing operations. With enough captured signatures and enough careful analysis, the attacker can reconstruct the private key.

The catch is what is required to do this in practice:

Compare this to a phishing attack. Phishing requires zero physical access, costs effectively nothing, and is automated at scale. The realistic threat model for ninety nine point nine percent of users is a phishing attack, and a Yubikey shuts that down completely. EUCLEAK is a real attack and a meaningful disclosure, but it is in a fundamentally different category.

What Yubico did

Yubico responded with advisory YSA-2024-03 and firmware 5.7, which replaces Infineon’s ECDSA library with one written by Yubico that does not have the same side channel weakness. Firmware 5.7 also brings unrelated improvements, including CTAP 2.1, Ed25519 support, RSA-3072 and RSA-4096, enterprise attestation, enhanced PIN complexity, and restricted NFC mode.

Crucially, Yubikey firmware cannot be updated in the field. There is no patch path for an existing key. If you bought a Yubikey before May 2024, your key is on a firmware that is still vulnerable to EUCLEAK. The only mitigation is replacement.

Yubico has been honest about this. They publish a tool to check your firmware version through the Yubico Authenticator app. If you see anything below 5.7, your key is in scope of the vulnerability.

Should you replace your key?

It depends on your threat model. Ask yourself:

If the answer to either is no, your existing pre 5.7 key is still doing its job. The phishing resistance that made you buy the key in the first place is unaffected.

If the answer to both is yes, you are in a small group: senior officials, intelligence targets, journalists in hostile environments, custodians of significant cryptocurrency keys, and similar. Replace your key with a 5.7 firmware unit. Yubico has a trade in program for some affected customers.

What this means for the broader market

EUCLEAK is not unique to Yubico. The same NXP A700x family ships in Google Titan keys and a handful of other vendors that license the same secure element. Google has not issued a recall and the practical risk profile is the same as for Yubico: physical access required, expensive lab equipment required, currently shipped Titans use updated cryptography.

For other vendors, ask the same questions you would ask after any disclosure. What chip is this key built on? Has the vendor responded? Is there a firmware fix? If yes, can you update? If no, what is the replacement path?

This is one of the reasons the catalog now distinguishes CTAP 2.1 from CTAP 2.0 and notes hardware boundaries explicitly. The boring details matter when something like EUCLEAK lands.

In short

If you are unsure, the conservative answer is to register a 5.7 or later key as a backup against your important accounts and keep your existing key in service. If something goes wrong with the older key, you still have access. If nothing goes wrong, you have a second key, which is what every guide tells you to have anyway.