Patch Windows 10 as soon as possible to protect yourself against certificate spoofing

Posted on Wednesday, January 15 2020 @ 10:28 CET by Thomas De Maesschalck
MSFT
This month's dose of Patch Tuesday includes an update for a Windows vulnerability that was discovered by the NSA. Even though it's marked as "important" by Microsoft because it isn't actively exploited in the wild yet, security researchers believe users need to patch as soon as possible as it's a very dangerous bug.

The bug is located in crypt32.dll and compromises authentication on Windows desktops and servers, and also makes it possible to spoof digital signatures. Among other things, the bug makes it possible for malware to pose a a legitimate piece of software.
The vulnerability is in the component of Windows' cryptography library that validates X.509 certificates, somehow bypassing the chain of trust used to validate the certificate. Microsoft's advisory on the vulnerability said that the bug could be used to fake the software-signing certificate on a malicious version of an application, making it look like it came from a trusted developer. However, the risk extends beyond just code-signing. A National Security Agency advisory indicates that the vulnerability could be used for man-in-the-middle attacks against secure HTTP (HTTPS) connections, as well, and to spoof signed files and emails.
Affected versions of Windows include Windows 10, Windows Server 2016, Windows Server 2019, and Windows Server version 1803.



Via: ARS Technica


About the Author

Thomas De Maesschalck

Thomas has been messing with computer since early childhood and firmly believes the Internet is the best thing since sliced bread. Enjoys playing with new tech, is fascinated by science, and passionate about financial markets. When not behind a computer, he can be found with running shoes on or lifting heavy weights in the weight room.



Loading Comments