CVE-2020-0601
14.01.2020, 23:15
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.Enginsight
Vendor | Product | Version |
---|---|---|
microsoft | windows_10_1507 | - |
microsoft | windows_10_1507 | - |
microsoft | windows_10_1607 | - |
microsoft | windows_10_1607 | - |
microsoft | windows_10_1709 | - |
microsoft | windows_10_1709 | - |
microsoft | windows_10_1709 | - |
microsoft | windows_10_1803 | - |
microsoft | windows_10_1803 | - |
microsoft | windows_10_1803 | - |
microsoft | windows_10_1809 | * |
microsoft | windows_10_1809 | * |
microsoft | windows_10_1809 | * |
microsoft | windows_10_1903 | - |
microsoft | windows_10_1903 | - |
microsoft | windows_10_1903 | - |
microsoft | windows_10_1909 | - |
microsoft | windows_10_1909 | - |
microsoft | windows_10_1909 | - |
microsoft | windows_server_1803 | - |
microsoft | windows_server_1903 | - |
microsoft | windows_server_1909 | - |
microsoft | windows_server_2016 | - |
microsoft | windows_server_2019 | - |
golang | go | 1.12 ≤ 𝑥 < 1.12.16 |
golang | go | 1.13 ≤ 𝑥 < 1.13.7 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References