A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka Windows CryptoAPI Spoofing Vulnerability.
The product does not validate, or incorrectly validates, a certificate.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Windows_10_1507 | Microsoft | - (including) | - (including) |
Windows_10_1607 | Microsoft | - (including) | - (including) |
Windows_10_1709 | Microsoft | - (including) | - (including) |
Windows_10_1803 | Microsoft | - (including) | - (including) |
Windows_10_1809 | Microsoft | * | * |
Windows_10_1903 | Microsoft | - (including) | - (including) |
Windows_10_1909 | Microsoft | - (including) | - (including) |
Windows_server_1803 | Microsoft | - (including) | - (including) |
Windows_server_1903 | Microsoft | - (including) | - (including) |
Windows_server_1909 | Microsoft | - (including) | - (including) |
Windows_server_2016 | Microsoft | - (including) | - (including) |
Windows_server_2019 | Microsoft | - (including) | - (including) |