Дата обнаружения
|
14/01/2020 |
Уровень угрозы
|
Critical |
Описание
|
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, bypass security restrictions, spoof user interface, cause denial of service. Below is a complete list of vulnerabilities:
Technical details (8) CVE-2020-0601 The certificate validation vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates. It could allow an adversary to spoof a code-signing or TLS certificate and have it appear as valid, in addition this vulnerability may allow remote code execution. This Microsoft security patch also creates a new log event with event ID 1 in the Windows Application event log to record the attempted exploitation of this vulnerability. |
Эксплуатация
|
The following public exploits exists for this vulnerability: https://github.com/ollypwn/BlueGate https://github.com/nissan-sudo/CVE-2020-0601 https://github.com/0xxon/cve-2020-0601 https://github.com/SherlockSec/CVE-2020-0601 https://github.com/JPurrier/CVE-2020-0601 https://github.com/0xxon/cve-2020-0601-plugin https://github.com/ly4k/CurveBall https://github.com/kudelskisecurity/chainoffools https://github.com/RrUZi/Awesome-CVE-2020-0601 https://github.com/BlueTeamSteve/CVE-2020-0601 https://github.com/apmunch/CVE-2020-0601 https://github.com/saleemrashid/badecparams https://github.com/0xxon/cve-2020-0601-utils https://github.com/Doug-Moody/Windows10_Cumulative_Updates_PowerShell https://github.com/MarkusZehnle/CVE-2020-0601 https://github.com/YoannDqr/CVE-2020-0601 https://github.com/thimelp/cve-2020-0601-Perl https://github.com/dlee35/curveball_lua https://github.com/IIICTECH/-CVE-2020-0601-ECC—EXPLOIT https://github.com/Ash112121/CVE-2020-0601 https://github.com/gentilkiwi/curveball https://github.com/Hans-MartinHannibalLauridsen/CurveBall https://github.com/apodlosky/PoC_CurveBall https://github.com/ioncodes/Curveball https://github.com/amlweems/gringotts https://github.com/yanghaoi/CVE-2020-0601 https://github.com/talbeerysec/CurveBallDetection https://github.com/david4599/CurveballCertTool https://github.com/eastmountyxz/CVE-2020-0601-EXP https://github.com/cimashiro/-Awesome-CVE-2020-0601- https://github.com/ollypwn/CurveBall Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Пораженные продукты
|
Windows Server 2019 (Server Core installation) |
Решение
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Первичный источник обнаружения
|
CVE-2020-0609 CVE-2020-0608 CVE-2020-0625 CVE-2020-0624 CVE-2020-0623 CVE-2020-0622 CVE-2020-0621 CVE-2020-0620 CVE-2020-0601 CVE-2020-0629 CVE-2020-0628 CVE-2020-0644 CVE-2020-0641 CVE-2020-0643 CVE-2020-0642 CVE-2020-0607 CVE-2020-0630 CVE-2020-0631 CVE-2020-0632 CVE-2020-0633 CVE-2020-0634 CVE-2020-0635 CVE-2020-0636 CVE-2020-0637 CVE-2020-0612 CVE-2020-0639 CVE-2020-0610 CVE-2020-0611 CVE-2020-0616 CVE-2020-0617 CVE-2020-0614 CVE-2020-0615 CVE-2020-0627 CVE-2020-0626 CVE-2020-0613 CVE-2020-0638 |
Оказываемое влияние
?
|
ACE
[?]
OSI
[?]
DoS
[?]
SB
[?]
PE
[?]
|
Связанные продукты
|
Microsoft Windows |
CVE-IDS
|
CVE-2020-06082.1Warning CVE-2020-06254.6Warning CVE-2020-06244.6Warning CVE-2020-06234.6Warning CVE-2020-06222.1Warning CVE-2020-06212.1Warning CVE-2020-06204.6Warning CVE-2020-06015.8High CVE-2020-06294.6Warning CVE-2020-06284.6Warning CVE-2020-06447.2High CVE-2020-06417.2High CVE-2020-06432.1Warning CVE-2020-06427.2High CVE-2020-06074.3Warning CVE-2020-06304.6Warning CVE-2020-06314.6Warning CVE-2020-06324.6Warning CVE-2020-06334.6Warning CVE-2020-06347.2High CVE-2020-06357.2High CVE-2020-06364.6Warning CVE-2020-06374.0Warning CVE-2020-06125.0Critical CVE-2020-06392.1Warning CVE-2020-06115.1High CVE-2020-06164.9Warning CVE-2020-06174.9Warning CVE-2020-06144.6Warning CVE-2020-06152.1Warning CVE-2020-06274.6Warning CVE-2020-06264.6Warning CVE-2020-06134.6Warning CVE-2020-06384.6Warning |
KB list
|
4534306 |