PromptRiskDBThreat intelligence atlas
AI Vulnerability Context

CVE-2020-0601 - Microsoft Windows

Microsoft Windows CryptoAPI (Crypt32.dll) contains a spoofing vulnerability in the way it validates Elliptic Curve Cryptography (ECC) certificates. An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source. A successful exploit could also allow the attacker to conduct man-in-the-middle atta...

AI Vulnerability ContextCISA KEVMicrosoft

Record summary

A quick snapshot of what this page covers.

CISA KEVyesWhether CISA lists this as exploited.
Techniques0AI attack methods connected to this vulnerability.
Case studies0Examples where this vulnerability is mentioned.

Vulnerability status

How serious this vulnerability is and whether it is known to be exploited.

CISA KEV
CVE ID
CVE-2020-0601
Vendor/project
Microsoft
Product
Windows
Vulnerability name
Microsoft Windows CryptoAPI Spoofing Vulnerability
Date added
2021-11-03
Due date
2022-05-03
Known ransomware campaign use
Unknown
CWE-295

Exploit context

What the vulnerability is about.

Microsoft Windows CryptoAPI (Crypt32.dll) contains a spoofing vulnerability in the way it validates Elliptic Curve Cryptography (ECC) certificates. An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source. A successful exploit could also allow the attacker to conduct man-in-the-middle attacks and decrypt confidential information on user connections to the affected software. The vulnerability is also known under the moniker of CurveBall.

Source

Where this page information comes from.