Published: 2025-09
CVSS Severity: 4.8
In September 2024 the EUCLEAK vulnerability, which affected the iShield Key 1 series was discovered and patched in October 2024. See Security Advisory SB-2024-01 (https://swissbit.com/security-advisory/sb-2024-01).
In July 2025, the German BSI brought to our attention that it's possible to recover the attestation private key from an unpatched iShield Key 1 device.
Since the attestation key has remained constant, a relying party cannot verify whether the attestation signature originated from an authentic iShield Key 1 device regardless of the firmware version. An attacker could create a fraudulent iShield Key 1 which would produce a valid FIDO attestation signature during registration. Organizations that depend on the FIDO attestation to verify the authenticity of an iShield Key 1 should no longer trust the attestation signature of the iShield Key 1 with AAGUIDs:
931327dd-c89b-406c-a81e-ed7058ef36c6
5d629218-d3a5-11ed-afa1-0242ac120002
iShield Key Pro
iShield Key FIDO2
SNU20000D1PBAN0-E-XX-XXX-XXX
SNU20000D1PBCN0-E-XX-XXX-XXX
All products in the iShield Key 1.1 & iShield Key 2 series are not affected
Swissbit iShield Key 1.1
Swissbit iShield Key 1.1 FIPS
Swissbit iShield Key 2
Swissbit iShield Key 2 FIPS
Swissbit iShield Key 2 Enterprise
Swissbit iShield Key 2 FIPS Enterprise
PK2000IA0000E-1002-XXX-XXX
PK2000IC0000E-2002-XXX-XXX
PK2000IA0000E-2002-XXX-XXX
To determine whether your iShield Key 1 is affected:
Open the iShield Key Manager and connect your iShield Key 1.
Check the AAGUID field in the FIDO2 card. If it matches one of the following, your device is affected:
931327ddc89b406ca81eed7058ef36c6
5d629218d3a511edafa10242ac120002
A sophisticated attacker with specialized equipment can create a fraudulent iShield Key 1 device that is indistinguishable from a legitimate one.
FIDO attestation is used to prove to a relying party that a security key is of the make and model that it claims to be. This is achieved using a shared attestation private key that signs the makeCredential response during registration.
To protect user privacy, the same attestation key is used across all devices of the same model. It is typically rotated after at least 100,000 units have been produced.
However, since the attestation key for iShield Key 1 devices was not rotated, even devices with firmware version 3.35.0 or later remain vulnerable.
Implication: Organizations that depend on the FIDO attestation to verify the authenticity of an iShield Key 1 should no longer trust the attestation signature of a newly registered iShield Key 1.