!!! Overview [{$pagename}] (also known variously as [Crypt32.dll], Microsoft Cryptography API, MS-CAPI or simply CAPI) is a [Microsoft Windows] [API] provides [Cryptosystem] services that enable developers to secure Windows-based [applications] using [cryptography], and includes functionality for [Encryption] and [Decryption] [data] using digital [certificates]. [{$pagename}] uses the [crypt32.dll] which is a [Microsoft Windows] [Software library] that "[certificate] and [cryptographic] [Message] [functions]. [{$pagename}] was first introduced in [Windows NT] 4.0 !! [CVE-2020-0601|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0601|target='_blank'] (aka CurveBall) At a high level, this [vulnerability] takes advantage of the fact that Crypt32.dll fails to properly check that the [Elliptic Curve] parameters specified in a provided [Root Certificate] match those known to [Microsoft]. This is considered a [spoofing] [vulnerability] that exists in the way [Microsoft Windows] [{$pagename}] ([Crypt32.dll]) validates [Digitally Signed] [messages] on [Elliptic Curve] [Cryptography] (ECC). There are at least two instances demonstrated where an [attacker] could exploit the [vulnerability]: * by using a spoofed [code]-signing [certificate] to sign a [malicious] executable * the [attacker] to conduct [Man-In-The-Middle] [attacks] and decrypt [confidential] information on user connections to the affected software. In both of these it appears the [Digitally Signed] file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'. You should also examine their [Windows Event Log] for instances of the new CveEventWrite event, which indicates active exploitation of the [vulnerability] in an environment The [vulnerability] exists in these products: * [Windows 10] (all build numbers) * [Windows Server 2016] * [Windows Server 2019] Older versions of Windows are __not affected__. As of Jan. 15, [2020|Year 2020], this [vulnerability] is known to be exploited in the wild and the [Attack Effort] is considered low. The first proof-of-concept "fake ID generators" are out – a Python program of 53 lines, and a Ruby script of just 21 and they really are sitting there for anyone to use for free. Visit [https://curveballtest.com|https://curveballtest.com|target='_blank'] to test if your browser is vulnerable !! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }] ---- * [#1] - [Microsoft_CryptoAPI|Wikipedia:Microsoft_CryptoAPI|target='_blank'] - based on information obtained 2020-01-23 * [#2] - [Cryptic Rumblings Ahead of First 2020 Patch Tuesday|https://krebsonsecurity.com/2020/01/cryptic-rumblings-ahead-of-first-2020-patch-tuesday/#more-50171|target='_blank'] - based on information obtained 2020-01-17 * [#3] - [Patch Critical Cryptographic Vulnerability in Microsoft Windows Clients and Servers|https://media.defense.gov/2020/Jan/14/2002234275/-1/-1/0/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF|target='_blank'] - based on information obtained 2020-01-17 * [#4] - [CVE-2020-0601 - Windows CryptoAPI Spoofing Vulnerability|https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0601|target='_blank'] - based on information obtained 2020-01-17 * [#5] - [CVE-2020-0601 Detail|https://nvd.nist.gov/vuln/detail/CVE-2020-0601#vulnCurrentDescriptionTitle|target='_blank'] - based on information obtained 2020-01-23 * [#6] - [Win10 Crypto Vulnerability: Cheating in Elliptic Curve Billiards 2|https://medium.com/zengo/win10-crypto-vulnerability-cheating-in-elliptic-curve-billiards-2-69b45f2dcab6|target='_blank'] - based on information obtained 2020-01-23 * [#7] - [CurveBall’s Additional Twist: The Certificate Comparison Bug|https://medium.com/zengo/curveballs-additional-twist-the-certificate-comparison-bug-2698aea445b5|target='_blank'] - based on information obtained 2020-01-23 * [#8] - [NSA and Github ‘rickrolled’ using Windows CryptoAPI bug|https://nakedsecurity.sophos.com/2020/01/16/nsa-and-github-rickrolled-using-windows-cryptoapi-bug/|target='_blank'] - based on information obtained 2020-01-23 * [#2] - [CVE-2020-0601 Followup|https://isc.sans.edu/forums/diary/CVE20200601+Followup/25714/|target='_blank'] - based on information obtained 2020-01-23