A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.
History

Fri, 07 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2021-11-03'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2025-02-07T15:27:24.883Z

Reserved: 2019-11-04T00:00:00.000Z

Link: CVE-2020-0601

cve-icon Vulnrichment

Updated: 2024-08-04T06:11:04.613Z

cve-icon NVD

Status : Modified

Published: 2020-01-14T23:15:30.207

Modified: 2025-02-07T16:15:30.777

Link: CVE-2020-0601

cve-icon Redhat

No data.