支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 65e0edf5a022a2cf9f96a9aecf063c472a728468

来源
关联漏洞
标题:Microsoft Windows CryptoAPI 信任管理问题漏洞 (CVE-2020-0601)
Description:Microsoft Windows CryptoAPI是美国微软(Microsoft)公司的一个在Windows 操作系统中添加的密码编译机能。作为资料加密与解密功能的重要基础,CryptoAPI 支持同步,异步的密钥加密处理,以及操作系统中的数字证书 的管理工作。 Microsoft Windows CryptoAPI (Crypt32.dll)中验证椭圆曲线加密(ECC)证书的方法存在信任管理问题漏洞。攻击者可通过使用欺骗性的代码签名证书利用该漏洞签名恶意的可执行文件。以下产品及版本受到影响:Micr
Description
Curated list of CVE-2020-0601 resources
介绍
# ChainOfFools AKA CurveBall AKA CVE-2020-0601
Collection of CVE-2020-0601 (\#ChainOfFools | \#CurveBall) resources

## General
A summary from the [NSA advisory](https://media.defense.gov/2020/Jan/14/2002234275/-1/-1/0/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF) states.

> NSA has discovered a critical vulnerability (CVE-2020-0601) affecting Microsoft Windows®1 cryptographic functionality. The certificate validation vulnerability allows an attacker to undermine how Windows verifies cryptographic trust and can enable remote code execution. The vulnerability affects Windows 10 and Windows Server 2016/2019 as well as applications that rely on Windows for trust functionality. Exploitation of the vulnerability allows attackers to defeat trusted network connections and deliver executable code while appearing as legitimately trusted entities. Examples where validation of trust may be impacted include:
> - HTTPS connections
> - Signed files and emails
> - Signed executable code launched as user-mode processes

## Blogs and Explanations
Walkthough and PoC demo from Kudelski Security
- https://research.kudelskisecurity.com/2020/01/15/cve-2020-0601-the-chainoffools-attack-explained-with-poc/

In depth blog from [Ken Whyte](https://twitter.com/kennwhite)
- https://blog.lessonslearned.org/chain-of-fools/

Hacker News discussion
- https://news.ycombinator.com/item?id=22048619

[Tal Be'ery](https://twitter.com/TalBeerySec) commentary
- https://medium.com/zengo/win10-crypto-vulnerability-cheating-in-elliptic-curve-billiards-2-69b45f2dcab6

## Proof of Concepts
Kudelski Securitry python PoC
- https://github.com/kudelskisecurity/chainoffools

[Ollypwn](https://twitter.com/ollypwn) ruby PoC
- https://github.com/ollypwn/cve-2020-0601

Example fake github cert for MitM or phishing
- https://twitter.com/saleemrash1d/status/1217495681230954506

Example signed malware reducing AV detections
- https://twitter.com/RedDrip7/status/1217771072180801537

## Detections
3rd CurveBall blog from [Tal Be'ery](https://twitter.com/TalBeerySec) describing Wireshark network detections
- https://medium.com/zengo/hitting-a-curveball-like-a-pro-129c1dca427c

Microsoft have released an event log message when suspected exploitation is attempted via  the CveEventWrite function
- https://docs.microsoft.com/en-us/windows/win32/api/securitybaseapi/nf-securitybaseapi-cveeventwrite

[Matt Graeber](https://twitter.com/mattifestation/status/1217179698008068096) has produced a powershell oneliner for host EDR detection
```
Get-WinEvent -FilterHashtable @{ LogName = 'Application'; Id = 1; ProviderName = 'Microsoft-Windows-Audit-CVE' } | select -Property * -ExcludeProperty MachineName, UserId
```
A Sigma SIEM rule from [Florian Roth](https://twitter.com/cyb3rops/status/1217545671424847874) for us in multiple SIEM tools and based off the Microsoft event log
![Sigma Rule](https://pbs.twimg.com/media/EOWVMzpWAAUrATB?format=png&name=900x900)

A detection by [0xxon](https://twitter.com/0xxon) for Zeekurity network morning tool to alert when custom ECC generators are observed within certificates
- https://twitter.com/0xxon/status/1217288808443441152
- https://github.com/0xxon/cve-2020-0601

## Advisories
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0601
- https://www.cisecurity.org/advisory/a-vulnerability-in-the-microsoft-cryptographic-library-crypt32dll-could-allow-for-remote-code-execution_2020-005/
- https://www.us-cert.gov/ncas/alerts/aa20-014a
- https://www.cisa.gov/blog/2020/01/14/windows-vulnerabilities-require-immediate-attention
- https://kb.cert.org/vuls/id/849224/
- https://cyber.dhs.gov/ed/20-02/
- https://media.defense.gov/2020/Jan/14/2002234275/-1/-1/0/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF
文件快照

[4.0K] /data/pocs/65e0edf5a022a2cf9f96a9aecf063c472a728468 ├── [1.0K] LICENSE └── [3.7K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。