// For flags

CVE-2020-0601

Microsoft Windows CryptoAPI Spoofing Vulnerability

Severity Score

8.1
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

36
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

Act
*SSVC
Descriptions

A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.

Se presenta una vulnerabilidad de suplantación de identidad en la manera en que Windows CryptoAPI (Crypt32.dll) comprueba los certificados Elliptic Curve Cryptography (ECC). Un atacante podría explotar la vulnerabilidad mediante el uso de un certificado de firma de código falsificado para firmar un ejecutable malicioso, haciendo que parezca que el archivo era de una fuente confiable y legítima, también se conoce como "Windows CryptoAPI Spoofing Vulnerability".

Microsoft Windows CryptoAPI (Crypt32.dll) contains a spoofing vulnerability in the way it validates Elliptic Curve Cryptography (ECC) certificates. An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source. A successful exploit could also allow the attacker to conduct man-in-the-middle attacks and decrypt confidential information on user connections to the affected software. The vulnerability is also known under the moniker of CurveBall.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Act
Exploitation
Active
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2019-11-04 CVE Reserved
  • 2020-01-14 CVE Published
  • 2020-01-14 First Exploit
  • 2020-01-29 KEV Due Date
  • 2021-11-03 Exploited in Wild
  • 2025-02-07 CVE Updated
  • 2025-04-17 EPSS Updated
CWE
  • CWE-295: Improper Certificate Validation
CAPEC
References (39)
URL Date SRC
https://packetstorm.news/files/id/155960 2020-01-16
https://packetstorm.news/files/id/155961 2020-01-16
https://www.exploit-db.com/exploits/47933 2020-01-15
https://github.com/eastmountyxz/CVE-2020-0601-EXP 2020-02-17
https://github.com/IIICTECH/-CVE-2020-0601-ECC---EXPLOIT 2020-01-19
https://github.com/RrUZi/Awesome-CVE-2020-0601 2020-02-02
https://github.com/nissan-sudo/CVE-2020-0601 2020-01-14
https://github.com/BlueTeamSteve/CVE-2020-0601 2020-02-03
https://github.com/yanghaoi/CVE-2020-0601 2021-04-08
https://github.com/MarkusZehnle/CVE-2020-0601 2020-01-17
https://github.com/YoannDqr/CVE-2020-0601 2020-01-20
https://github.com/SherlockSec/CVE-2020-0601 2020-01-15
https://github.com/JPurrier/CVE-2020-0601 2020-01-17
https://github.com/Ash112121/CVE-2020-0601 2020-01-20
https://github.com/exploitblizzard/CVE-2020-0601-spoofkey 2021-03-14
https://github.com/cimashiro/-Awesome-CVE-2020-0601- 2023-04-04
https://github.com/okanulkr/CurveBall-CVE-2020-0601-PoC 2021-03-27
https://github.com/0xxon/cve-2020-0601 2024-08-12
https://github.com/ly4k/CurveBall 2024-09-13
https://github.com/kudelskisecurity/chainoffools 2024-08-12
https://github.com/saleemrashid/badecparams 2024-08-12
https://github.com/Doug-Moody/Windows10_Cumulative_Updates_PowerShell 2024-08-12
https://github.com/thimelp/cve-2020-0601-Perl 2024-08-12
https://github.com/dlee35/curveball_lua 2024-08-12
https://github.com/gentilkiwi/curveball 2024-10-22
https://github.com/Hans-MartinHannibalLauridsen/CurveBall 2024-08-12
https://github.com/apodlosky/PoC_CurveBall 2024-08-12
https://github.com/ioncodes/Curveball 2024-08-12
https://github.com/amlweems/gringotts 2024-08-12
https://github.com/talbeerysec/CurveBallDetection 2024-08-12
https://github.com/david4599/CurveballCertTool 2024-08-12
https://github.com/gremwell/cve-2020-0601_poc 2024-08-12
https://github.com/bsides-rijeka/meetup-2-curveball 2024-08-12
https://github.com/ShayNehmad/twoplustwo 2024-08-12
https://github.com/tyj956413282/curveball-plus 2023-09-26
https://github.com/JoelBts/CVE-2020-0601_PoC 2024-05-16
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Golang
Search vendor "Golang"
Go
Search vendor "Golang" for product "Go"
>= 1.12 < 1.12.16
Search vendor "Golang" for product "Go" and version " >= 1.12 < 1.12.16"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
--
Safe
Golang
Search vendor "Golang"
Go
Search vendor "Golang" for product "Go"
>= 1.13 < 1.13.7
Search vendor "Golang" for product "Go" and version " >= 1.13 < 1.13.7"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
--
Safe
Microsoft
Search vendor "Microsoft"
Windows 10
Search vendor "Microsoft" for product "Windows 10"
--
Affected
Microsoft
Search vendor "Microsoft"
Windows 10
Search vendor "Microsoft" for product "Windows 10"
1607
Search vendor "Microsoft" for product "Windows 10" and version "1607"
-
Affected
Microsoft
Search vendor "Microsoft"
Windows 10
Search vendor "Microsoft" for product "Windows 10"
1709
Search vendor "Microsoft" for product "Windows 10" and version "1709"
-
Affected
Microsoft
Search vendor "Microsoft"
Windows 10
Search vendor "Microsoft" for product "Windows 10"
1803
Search vendor "Microsoft" for product "Windows 10" and version "1803"
-
Affected
Microsoft
Search vendor "Microsoft"
Windows 10
Search vendor "Microsoft" for product "Windows 10"
1809
Search vendor "Microsoft" for product "Windows 10" and version "1809"
-
Affected
Microsoft
Search vendor "Microsoft"
Windows 10
Search vendor "Microsoft" for product "Windows 10"
1903
Search vendor "Microsoft" for product "Windows 10" and version "1903"
-
Affected
Microsoft
Search vendor "Microsoft"
Windows 10
Search vendor "Microsoft" for product "Windows 10"
1909
Search vendor "Microsoft" for product "Windows 10" and version "1909"
-
Affected
Microsoft
Search vendor "Microsoft"
Windows Server 2016
Search vendor "Microsoft" for product "Windows Server 2016"
--
Affected
Microsoft
Search vendor "Microsoft"
Windows Server 2016
Search vendor "Microsoft" for product "Windows Server 2016"
1803
Search vendor "Microsoft" for product "Windows Server 2016" and version "1803"
-
Affected
Microsoft
Search vendor "Microsoft"
Windows Server 2016
Search vendor "Microsoft" for product "Windows Server 2016"
1903
Search vendor "Microsoft" for product "Windows Server 2016" and version "1903"
-
Affected
Microsoft
Search vendor "Microsoft"
Windows Server 2016
Search vendor "Microsoft" for product "Windows Server 2016"
1909
Search vendor "Microsoft" for product "Windows Server 2016" and version "1909"
-
Affected
Microsoft
Search vendor "Microsoft"
Windows Server 2019
Search vendor "Microsoft" for product "Windows Server 2019"
--
Affected