- Joined
- Sep 18, 2017
Microsoft fixes Windows crypto bug reported by the NSA (http://archive.is/JsScb)
Microsoft has released a security update today to fix "a broad cryptographic vulnerability" impacting the Windows operating system.
The bug was discovered and reported by the US National Security Agency (NSA), NSA Director of Cybersecurity Anne Neuberger said in a press call today.
The CVE-2020-0601 bug
The vulnerability, tracked as CVE-2020-0601, impacts the Windows CryptoAPI, a core component of the Windows operating system that handles cryptographic operations.
According to a security advisory published today, "a spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates."
Microsoft says that an attacker could exploit this bug "to sign a malicious executable, making it appear the file was from a trusted, legitimate source."
But besides faking file signatures, the bug could also be used to fake digital certificates used for encrypted communications.
"A successful exploit could also allow the attacker to conduct man-in-the-middle attacks and decrypt confidential information on user connections to the affected software," Microsoft also said.
According to Microsoft, this vulnerability impacts Windows 10, Windows Server 2019, and Windows Server 2016 OS versions.
Microsoft and the NSA said they have not seen any active attacks exploiting this bug prior to today's patch.
Microsoft has released a security update today to fix "a broad cryptographic vulnerability" impacting the Windows operating system.
The bug was discovered and reported by the US National Security Agency (NSA), NSA Director of Cybersecurity Anne Neuberger said in a press call today.
The CVE-2020-0601 bug
The vulnerability, tracked as CVE-2020-0601, impacts the Windows CryptoAPI, a core component of the Windows operating system that handles cryptographic operations.
According to a security advisory published today, "a spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates."
Microsoft says that an attacker could exploit this bug "to sign a malicious executable, making it appear the file was from a trusted, legitimate source."
But besides faking file signatures, the bug could also be used to fake digital certificates used for encrypted communications.
"A successful exploit could also allow the attacker to conduct man-in-the-middle attacks and decrypt confidential information on user connections to the affected software," Microsoft also said.
According to Microsoft, this vulnerability impacts Windows 10, Windows Server 2019, and Windows Server 2016 OS versions.
Microsoft and the NSA said they have not seen any active attacks exploiting this bug prior to today's patch.
Last edited by a moderator: