Yes that was exactly what I meant and so... I don't think MSO-like server or CA/Chain import can this "same public Attestation Certificate everywhere" problem.
The -quite hard- real world attack could be described like this :
In a big company when FIDO U2F devices from manufacturer XYZ are deployed and where users have to add/enroll their U2F devices to their existing user/password protected accounts, the attacker would have to replace legit U2F tokens from XYZ manufacturer with fake ones, with the same casing, the same copied XYZ Attestation certificate and a non-random private key generator. These fake keys can't be detected/rejected by authentication servers that will accept non-secure enrollment.
Sometimes, you can avoid that by deploying already enrolled tokens... but this option is simply not available like inside Google Apps for Work admin panel where admins can't enroll a token on the behalf of a user before giving a token .
There are other solutions that would require modification of the standard and this is probably outside the scope of generic open FIDO U2F devices and outside the scope of this forum.
--
Frederic MARTIN
NEOWAVE
Security & System Architect