CryptoAPI uses the crypt32.dll which is a Microsoft Windows Software library that "certificate and cryptographic Message functions.
CryptoAPI was first introduced in Windows NT 4.0
This is considered a spoofing vulnerability that exists in the way Microsoft Windows CryptoAPI (Crypt32.dll) validates Digitally Signed messages on Elliptic Curve Cryptography (ECC). There are at least two instances demonstrated where an attacker could exploit the vulnerability:
You should also examine their Windows Event Log for instances of the new CveEventWrite event, which indicates active exploitation of the vulnerability in an environment
The vulnerability exists in these products:
As of Jan. 15, 2020, this vulnerability is known to be exploited in the wild and the Attack Effort is considered low. The first proof-of-concept "fake ID generators" are out – a Python program of 53 lines, and a Ruby script of just 21 and they really are sitting there for anyone to use for free.
Visit https://curveballtest.com to test if your browser is vulnerable