First published: Tue Jan 14 2020(Updated: )
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | ||
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =1709 | |
Microsoft Windows 10 | =1803 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1903 | |
Microsoft Windows 10 | =1909 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | =1803 | |
Microsoft Windows Server 2016 | =1903 | |
Microsoft Windows Server 2016 | =1909 | |
Microsoft Windows Server 2019 | ||
Golang Go | >=1.12<1.12.16 | |
Golang Go | >=1.13<1.13.7 | |
Microsoft Windows | ||
Microsoft Windows | ||
All of | ||
Any of | ||
Golang Go | >=1.12<1.12.16 | |
Golang Go | >=1.13<1.13.7 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-0601 is a vulnerability in Microsoft Windows CryptoAPI (Crypt32.dll) that allows for spoofing of Elliptic Curve Cryptography certificates.
An attacker can use a spoofed code-signing certificate to sign a malicious executable, making it appear legitimate by bypassing Windows validation checks.
Anyone using Microsoft Windows is potentially affected by CVE-2020-0601.
The severity rating of CVE-2020-0601 is high.
Follow the instructions provided by Microsoft in their security advisory and apply the necessary security updates.