Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-0601

KEV EPSS 94.09% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-0601

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows CryptoAPI 信任管理问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows CryptoAPI是美国微软(Microsoft)公司的一个在Windows 操作系统中添加的密码编译机能。作为资料加密与解密功能的重要基础,CryptoAPI 支持同步,异步的密钥加密处理,以及操作系统中的数字证书 的管理工作。 Microsoft Windows CryptoAPI (Crypt32.dll)中验证椭圆曲线加密(ECC)证书的方法存在信任管理问题漏洞。攻击者可通过使用欺骗性的代码签名证书利用该漏洞签名恶意的可执行文件。以下产品及版本受到影响:Micr
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

II. Public POCs for CVE-2020-0601

#POC DescriptionSource LinkShenlong Link
1Remote Code Execution Exploit https://github.com/nissan-sudo/CVE-2020-0601POC Details
2Zeek package to detect CVE-2020-0601https://github.com/0xxon/cve-2020-0601POC Details
3A Windows Crypto Exploithttps://github.com/SherlockSec/CVE-2020-0601POC Details
4Nonehttps://github.com/JPurrier/CVE-2020-0601POC Details
5Zeek package that uses OpenSSL to detect CVE-2020-0601 exploit attemptshttps://github.com/0xxon/cve-2020-0601-pluginPOC Details
6PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)https://github.com/ly4k/CurveBallPOC Details
7A PoC for CVE-2020-0601https://github.com/kudelskisecurity/chainoffoolsPOC Details
8😂An awesome curated list of repos for CVE-2020-0601.https://github.com/RrUZi/Awesome-CVE-2020-0601POC Details
9Curated list of CVE-2020-0601 resourceshttps://github.com/BlueTeamSteve/CVE-2020-0601POC Details
10Proof of Concept for CVE-2020-0601https://github.com/saleemrashid/badecparamsPOC Details
11C++ based utility to check if certificates are trying to exploit CVE-2020-0601https://github.com/0xxon/cve-2020-0601-utilsPOC Details
12Powershell to patch CVE-2020-0601 . Complete security rollup for Windows 10 1507-1909https://github.com/Doug-Moody/Windows10_Cumulative_Updates_PowerShellPOC Details
13Nonehttps://github.com/MarkusZehnle/CVE-2020-0601POC Details
14CurveBall CVE exploitationhttps://github.com/YoannDqr/CVE-2020-0601POC Details
15Perl version of recently published scripts to build ECC certificates with specific parameters re CVE-2020-0601https://github.com/thimelp/cve-2020-0601-PerlPOC Details
16Repo containing lua scripts and PCAP to find CVE-2020-0601 exploit attempts via network traffichttps://github.com/dlee35/curveball_luaPOC Details
17CurveBall (CVE-2020-0601) - PoC CVE-2020-0601, or commonly referred to as CurveBall, is a vulnerability in which the signature of certificates using elliptic curve cryptography (ECC) is not correctly verified. Attackers can supply hand-rolled generators, bypassing validation, antivirus & all non-protections. https://github.com/IIICTECH/-CVE-2020-0601-ECC---EXPLOITPOC Details
18Nonehttps://github.com/Ash112121/CVE-2020-0601POC Details
19CVE-2020-0601 #curveball - Alternative Key Calculatorhttps://github.com/gentilkiwi/curveballPOC Details
20CVE-2020-0601: Windows CryptoAPI Vulnerability. (CurveBall/ChainOfFools)https://github.com/Hans-MartinHannibalLauridsen/CurveBallPOC Details
21PoC for "CurveBall" CVE-2020-0601https://github.com/apodlosky/PoC_CurveBallPOC Details
22PoC for CVE-2020-0601 - CryptoAPI exploithttps://github.com/ioncodes/CurveballPOC Details
23proof of concept for CVE-2020-0601https://github.com/amlweems/gringottsPOC Details
24PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll) POC: https://github.com/ollypwn/CurveBallhttps://github.com/yanghaoi/CVE-2020-0601POC Details
25Resources related to CurveBall (CVE-2020-0601) detectionhttps://github.com/talbeerysec/CurveBallDetectionPOC Details
26PoC for CVE-2020-0601 vulnerability (Code Signing)https://github.com/david4599/CurveballCertToolPOC Details
27这资源是作者复现微软签字证书漏洞CVE-2020-0601,结合相关资源及文章实现。推荐大家结合作者博客,理解ECC算法、Windows验证机制,并尝试自己复现可执行文件签名证书和HTTPS劫持的例子。作为网络安全初学者,自己确实很菜,但希望坚持下去,加油!https://github.com/eastmountyxz/CVE-2020-0601-EXPPOC Details
28这资源是作者复现微软签字证书漏洞CVE-2020-0601,结合相关资源及文章实现。推荐大家结合作者博客,复现了该漏洞和理解恶意软件自启动劫持原理。作为网络安全初学者,自己确实很菜,但希望坚持下去,一起加油!https://github.com/eastmountyxz/CVE-2018-20250-WinRARPOC Details
29CVE-2020-0601 proof of concepthttps://github.com/gremwell/cve-2020-0601_pocPOC Details
30Materials for the second Rijeka secuity meetup. We will be discussing Microsoft cryptoapi vulnerability dubbed CurveBall (CVE-2020-0601)https://github.com/bsides-rijeka/meetup-2-curveballPOC Details
31Nonehttps://github.com/exploitblizzard/CVE-2020-0601-spoofkeyPOC Details
32Implementing CVE-2020-0601https://github.com/ShayNehmad/twoplustwoPOC Details
33Nonehttps://github.com/okanulkr/CurveBall-CVE-2020-0601-PoCPOC Details
342017-0021https://github.com/cimashiro/-Awesome-CVE-2020-0601-POC Details
35simulation experiment of Curveball (CVE-2020-0601) attacks under ECQV implicit certificates with Windows-like verifiershttps://github.com/tyj956413282/curveball-plusPOC Details
36Demonstration of CVE-2020-0601 aka curveball. Based on the PoC's available at https://github.com/kudelskisecurity/chainoffools and https://github.com/ly4k/CurveBallhttps://github.com/JoelBts/CVE-2020-0601_PoCPOC Details
37Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Windows%20CryptoAPI%20%E6%AC%BA%E9%AA%97%E6%BC%8F%E6%B4%9E%20CVE-2020-0601.mdPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-0601

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2020-01-14 · 49 CVEs total

CVE-2020-0639Microsoft Windows Common Log File System驱动程序信息泄露漏洞
CVE-2020-0642Microsoft Windows和Microsoft Windows Server 资源管理错误漏洞
CVE-2020-0644Microsoft Windows和Microsoft Windows Server 安全漏洞
CVE-2020-0651Microsoft Excel 缓冲区错误漏洞
CVE-2020-0652Microsoft Office 缓冲区错误漏洞
CVE-2020-0653Microsoft Excel 缓冲区错误漏洞
CVE-2020-0654Microsoft OneDrive 安全漏洞
CVE-2020-0656Microsoft Dynamics 365 跨站脚本漏洞
CVE-2020-0650Microsoft Excel 缓冲区错误漏洞
CVE-2020-0640Microsoft Internet Explorer 缓冲区错误漏洞
CVE-2020-0641Microsoft Windows Media Service 安全漏洞
CVE-2020-0638Microsoft Update Notification Manager 安全漏洞
CVE-2020-0637微软 Microsoft Remote Desktop Web Access 信息泄露漏洞
CVE-2020-0636Microsoft Windows Subsystem for Linux 安全漏洞
CVE-2020-0635Microsoft Windows和Microsoft Windows Server 安全漏洞
CVE-2020-0634Microsoft Windows Common Log File System Driver 安全漏洞
CVE-2020-0633Microsoft Windows Search Indexer 安全漏洞
CVE-2020-0632Microsoft Windows Search Indexer 安全漏洞
CVE-2020-0631Microsoft Windows Search Indexer 安全漏洞
CVE-2020-0630Microsoft Windows Search Indexer 安全漏洞

Showing top 20 of 49 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-0601

No comments yet


Leave a comment