Windows 10: NSA reveals major flaw in Microsoft's code:
The US National Security Agency (NSA) has revealed a major flaw in Windows 10 that could have been used by hackers to create malicious software that looked legitimate.
Microsoft is expected to issue a patch later and to say that the bug has not been exploited by hackers.
The issue was revealed during an NSA press conference.
It was not clear how long it had known about it before revealing it to Microsoft.
Brian Krebs, the security expert who first reported the revelation[*], said the software giant had already sent the patch to branches of the US military and other high-level users. It was, he wrote, "extraordinarily scary".
The problem exists in a core component of Windows known as crypt32.dll, a program that allows software developers to access various functions, such as digital certificates which are used to sign software.
It could, in theory, have allowed a hacker to pass off a piece of malicious software as being entirely legitimate.
[*] Cryptic Rumblings Ahead of First 2020 Patch Tuesday.
https://kb.cert.org/vuls/id/849224/
The Microsoft Windows CryptoAPI, which is provided by Crypt32.dll, fails to validate ECC [Elliptic Curve Cryptography] certificates in a way that properly leverages the protections that ECC cryptography should provide. As a result, an attacker may be able to craft a certificate that appears to have the ability to be traced to a trusted root certificate authority.
Any software, including third-party non-Microsoft software, that relies on the Windows CertGetCertificateChain() function to determine if an X.509 certificate can be traced to a trusted root CA may incorrectly determine the trustworthiness of a certificate chain.
(Score: 2) by Osamabobama on Wednesday January 15 2020, @09:50PM (1 child)
So, does that include Windows 7? I mean, the story did come out yesterday...
Never mind; apparently it does not. From TFA:
Appended to the end of comments you post. Max: 120 chars.
(Score: 2) by arslan on Wednesday January 15 2020, @10:56PM
No it doesn't, not the this particular one that's related to the cryptoAPI cve as far as I can tell. It only affects Win 10, Win Server 2016 and 2019.