⚠ Actively exploited
Added to CISA KEV on 2021-11-03. Federal agencies required to patch by 2022-05-03. Required action: Apply updates per vendor instructions..
CVE-2020-0601 — Improper Certificate Validation in Microsoft Windows
Severity
8.1HIGHNVD
EPSS
94.1%
top 0.09%
CISA KEV
KEV
Added 2021-11-03
Due 2022-05-03
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedJan 14
KEV addedNov 3
KEV dueMay 3
Latest updateMar 26
CISA Required Action: Apply updates per vendor instructions.
Description
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:NExploitability: 2.8 | Impact: 5.2
Affected Packages9 packages
Patches
🔴Vulnerability Details
6GHSA▶
Forge has a basicConstraints bypass in its certificate chain verification (RFC 5280 violation)↗2026-03-26
OSV▶
Forge has a basicConstraints bypass in its certificate chain verification (RFC 5280 violation)↗2026-03-26
GHSA▶
GHSA-82jc-cv6x-r223: A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32↗2022-05-24
CVEList
▶
💥Exploits & PoCs
1Exploit-DB▶
Microsoft Windows - CryptoAPI (Crypt32.dll) Elliptic Curve Cryptography (ECC) Spoof Code-Signing Certificate↗2020-01-15
🔍Detection Rules
2📋Vendor Advisories
3🕵️Threat Intelligence
56Qualys▶
Part 2: An In-Depth Look at the Latest Vulnerability Threat Landscape (Attackers’ Edition)↗2023-07-18
📐Framework References
1CAPEC▶
Signature Spoofing by Improper Validation
📄Research Papers
4arXiv▶
Do Chase Your Tail! Missing Key Aspects Augmentation in Textual Vulnerability Descriptions of Long-tail Software through Feature Inference↗2024-12-15
arXiv
▶