A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/155960/CurveBall-Microsoft-Windows-CryptoAPI-Spoofing-Proof-Of-Concept.html | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/155961/CurveBall-Microsoft-Windows-CryptoAPI-Spoofing-Proof-Of-Concept.html | Third Party Advisory VDB Entry |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0601 | Patch Vendor Advisory |
http://packetstormsecurity.com/files/155960/CurveBall-Microsoft-Windows-CryptoAPI-Spoofing-Proof-Of-Concept.html | Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/155961/CurveBall-Microsoft-Windows-CryptoAPI-Spoofing-Proof-Of-Concept.html | Third Party Advisory VDB Entry |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0601 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
History
10 Apr 2025, 16:54
Type | Values Removed | Values Added |
---|---|---|
First Time |
Microsoft windows 10 1809
Microsoft windows 10 1507 Microsoft windows Server 1803 Microsoft windows Server 1909 Microsoft windows Server 1903 Microsoft windows 10 1803 Microsoft windows 10 1909 Microsoft windows 10 1607 Microsoft windows 10 1709 Microsoft windows 10 1903 |
|
CPE | cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:* |
cpe:2.3:o:microsoft:windows_server_1903:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_1803:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_1909:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:* |
Information
Published : 2020-01-14 23:15
Updated : 2025-04-10 16:54
NVD link : CVE-2020-0601
Mitre link : CVE-2020-0601
CVE.ORG link : CVE-2020-0601
JSON object : View
Products Affected
microsoft
- windows_server_1903
- windows_server_2019
- windows_10_1909
- windows_10_1903
- windows
- windows_10_1809
- windows_10_1709
- windows_server_2016
- windows_server_1803
- windows_10_1803
- windows_server_1909
- windows_10_1607
- windows_10_1507
golang
- go
CWE
CWE-295
Improper Certificate Validation