Software Secured Company Logo.
Services
Services
WEB, API & MOBILE SECURITY

Manual reviews expose logic flaws, chained exploits, and hidden vulnerabilities

Web Application Pentesting
Mobile Application Pentesting
Secure Code Review
Infrastructure & Cloud Security

Uncovers insecure networks, lateral movement, and segmentation gaps

External Network Pentesting
Internal Network Pentesting
Secure Cloud Review
AI, IoT & HARDWARE SECURITY

Specialized testing validates AI, IoT, and hardware security posture

AI Pentesting
IoT Pentesting
Hardware Pentesting
ADVANCED ADVERSARY SIMULATIONS

We simulate attackers, exposing systemic risks executives must address

Red Teaming
Social Engineering
Threat Modelling
PENETRATION TESTING AS A SERVICE

PTaaS provides continuous manual pentests, aligned with release cycles

Penetration Testing as a Service
OWASP TOP 10 TRAINING

Practical security training strengthens teams, shifting security left effectively

Secure Code Training
Ready to get started?
Identify real vulnerabilities confidently with zero-false-positive penetration testing
Learn More
Industries
Industries
INDUSTRIES
Data and AI

AI pentesting uncovers adversarial threats, ensuring compliance and investor trust

Healthcare

Penetration testing protects PHI, strengthens compliance, and prevents healthcare breaches

Finance

Manual pentests expose FinTech risks, securing APIs, cloud, and compliance

Security

Penetration testing validates SecurTech resilience, compliance, and customer trust

SaaS

Pentesting secures SaaS platforms, proving compliance and accelerating enterprise sales

CASE STUDY

“As custodians of digital assets, you should actually custodize assets, not outsource. Software Secured helped us prove that our custody technology truly delivers on that promise for our clients in both the cryptocurrency and traditional finance”

Nicolas Stalder,
CEO & Co-Founder, Cordial Systems
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
Compliance
Compliance
COMPLIANCE
SOC 2 Penetration Testing

Pentesting validates SOC 2 controls, proving real security to auditors and customers

HIPAA Penetration Testing

Manual pentesting proves HIPAA controls protect PHI beyond documentation

ISO 27001 Penetration Testing

Pentests uncover risks audits miss, securing certification and enterprise trust

PCI DSS Penetration Testing

Pentesting validates PCI DSS controls, protecting sensitive cardholder data

GDPR Penetration Testing

GDPR-focused pentests reduce breach risk, regulatory fines, and reputational loss

CASE STUDY

“Software Secured’s comprehensive approach to penetration testing and mobile expertise led to finding more vulnerabilities than our previous vendors.”

Kevin Scully,
VP of Engineering, CompanyCam
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
PricingPortal
Resources
Resources
COMPLIANCE
Blogs
Case Studies
Events & Webinars
Partners
Customer Testimonials
News & Press
Whitepapers
API & Web Application Security Testing

The Highest Threat: The Hidden Weakness in Modern API & Web Application Security

Alexis Savard
November 21, 2025
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
Login
Book a Consultation
Contact
Blog
/
Threat Modelling & Secure Design
/
Threat Modelling in Agile

Securing Biometric Authentication in SaaS Applications

A step-by-step guide for engineering and security leaders on implementing biometric login in SaaS apps securely, with proven practices for testing, fallback design, and compliance readiness.

By Sherif Koussa
・
8 min read
Table of contents
Text Link
Text Link

Biometric authentication (fingerprint, face or iris recognition, voice, behavioral traits, and others) is becoming a common feature in SaaS applications. Companies use it for user logins, KYC verification, privileged operations, and device access. The push toward passwordless authentication and multi-factor security makes biometrics attractive: they combine user convenience with stronger assurance.

The challenge is not the idea of biometrics, but the implementation. Poor storage, weak spoofing protection, and insecure fallback systems can make biometrics no safer than passwords. Below we explore recent vulnerabilities, the risks they highlight, and the top practices for reducing exposure.

Real-World Biometric Vulnerabilities

1. Windows Hello for Business Bypass
In 2025, researchers showed that with local administrator access, attackers could tamper with biometric templates stored on a device so the system would accept their fingerprint or face. Microsoft’s Enhanced Sign-In Security (ESS) mitigates the flaw, but only on newer hardware.

2. ZKTeco Biometric Terminals (2024)
Kaspersky uncovered dozens of bugs in biometric terminals, including SQL injection, command execution, and path traversal. These terminals, used for physical access, often tie into enterprise networks and SaaS systems.

3. Suprema Biostar 2 Breach (2019)
A centralized database holding millions of fingerprint and face templates was leaked. Unlike passwords, biometrics cannot be reset, making this type of breach permanently damaging.

4. Fingerprint Driver and Wallet Flaws
Researchers found issues in Synaptics drivers and SGX wallets that exposed biometric templates and allowed attackers to exfiltrate sensitive data, including cryptocurrency wallet details.

5. Dark Web Exposure and Privacy Risks
Biometric data has surfaced on underground markets. Many systems store templates unencrypted or with weak controls, exposing users to long-term identity risks.

6. Template Poisoning Attacks
Academic research shows that attackers can gradually “drift” biometric templates by exploiting update mechanisms, ultimately getting their own features accepted as valid.

‍

Here is a video that explains how secure is Biometric Authentication

Where Implementations Fail

  • Weak template storage: Templates stored in plaintext or without secure hardware protection are easy targets.
  • Local privilege issues: With admin access, attackers can bypass biometric checks.
  • Spoofing and liveness gaps: Simple photos, masks, or molds can bypass weak sensors.
  • Template poisoning: Systems that adapt to user changes can be silently hijacked.
  • Supporting bugs: APIs, firmware, or apps often contain injection or validation flaws.
  • Poor fallback design: Insecure recovery mechanisms can negate biometric security.
  • Regulatory risk: Mishandled biometrics trigger privacy fines and reputational damage.

Seven Practices to Reduce Biometric Risk

  1. Use secure hardware for storage
    Protect templates with TPMs, Secure Enclaves, or HSMs. Avoid centralized storage wherever possible.
  2. Apply strong template protection
    Encrypt data at rest, use non-invertible transformations, and never store raw images unless strictly required.
  3. Implement liveness detection
    Add anti-spoofing checks like blood flow detection or blinking. Consider multi-modal biometrics for higher assurance.
  4. Harden local devices
    Limit admin privileges, enforce secure boot, and keep firmware and OS patches current.
  5. Audit template updates
    Log and verify every update. Block silent changes that attackers could exploit for poisoning.
  6. Provide secure fallback paths
    Support recovery with PINs or tokens, but avoid weak fallbacks that attackers can exploit.
  7. Secure the full stack
    Protect firmware, APIs, mobile apps, and network transport with strong input validation, TLS, and regular testing.

Current Trends

  • The Windows Hello bypass in 2025 shows how even established platforms can be tricked with template manipulation.
  • The persistence of nOAuth-style vulnerabilities in SaaS apps proves that weak identity flows undermine biometrics, even with MFA enabled.

Checklist for SaaS Teams

  • Storage: Are templates protected by secure hardware and encryption?
  • Endpoint security: Is local privilege escalation blocked?
  • Spoofing tests: Have you validated sensors against masks and photos?
  • Template updates: Do you audit and monitor changes?
  • Fallbacks: Are recovery mechanisms resistant to abuse?
  • APIs and firmware: Are all components tested for common vulnerabilities?
  • Privacy: Do you comply with GDPR, CCPA, and data minimization standards?

How Software Secured Can Help

At Software Secured, we specialize in finding and fixing these risks before attackers exploit them.

  • Penetration Testing: We replicate real-world attacks against biometric endpoints, APIs, and supporting systems to uncover exploitable flaws.
  • Secure Code Review: We analyze how biometric templates, update processes, and fallbacks are handled at the code level to eliminate design weaknesses.

If you’re adding biometrics to your SaaS application, or want to validate that your current implementation is safe, our team can help. Secure and user-friendly biometrics are possible, but only with disciplined testing and strong code practices.

‍

About the author

Sherif Koussa

Sherif Koussa is a cybersecurity expert and entrepreneur with a rich software building and breaking background. In 2006, he founded the OWASP Ottawa Chapter, contributed to WebGoat and OWASP Cheat Sheets, and helped launch SANS/GIAC exams. Today, as CEO of Software Secured, he helps hundreds of SaaS companies continuously ship secure code.

Continue your reading with these value-packed posts

Threat Modelling & Secure Design

Executive Summary: STRIDE Threat Modelling for Secure-by-Design Architectures

Sherif Koussa
Sherif Koussa
9 min read
August 27, 2024
PCI DSS Penetration Testing

PCI DSS 4.0 Penetration Testing Requirements vs 3.2.1

Sherif Koussa
Sherif Koussa
12 minutes min read
April 16, 2025
Penetration Testing Services

Pros and Cons of Switching Pentest Vendors

Cate Callegari
Cate Callegari
6 min read
October 9, 2024

Get security insights straight to your inbox

Helping companies identify, understand, and solve their security gaps so their teams can sleep better at night

Book a Consultation
Centralize pentest progress in one place
Canadian based, trusted globally
Actionable remediation support, not just findings
Web, API, Mobile Security
Web App PentestingMobile App PentestingSecure Code Review
Infrastructure & Cloud Security
External Network PentestingInternal Network PentestingSecure Cloud Review
AI, IoT & Hardware Security
AI PentestingIoT PentestingHardware Pentesting
More
PricingPortalPartnersContact UsAbout UsOur TeamCareers
More Services
Pentesting as a ServiceSecure Code Training
Industries
Data and AIFinanceHealthcareSecuritySaaS
Compliance
GDPR PentestingHIPAA PentestingISO 27001 PentestingPCI DSS PentestingSOC 2 Pentesting
Resources
BlogsCase StudiesEvents & WebinarsCustomer TestimonialsNews & PressWhitepapers
More
PricingPortalPartnersContact UsAbout UsOur TeamCareers
Resources
BlogsCase StudiesEvents & WebinarsCustomer TestimonialsNews & PressWhitepapers
Security & CompliancePrivacy PolicyTerms & Conditions
2025 ©SoftwareSecured