A critical Windows CryptoAPI spoofing bug has recently been exploited, allowing hackers to spoof digital certificates that verify the identity of a website, program, or file.
The vulnerability, tracked as CVE-2020-0601, was discovered late last year by the National Security Agency (NSA) and impacts all supported versions of Microsoft Windows 10 and Windows Server 2016 or later.
This particular bug affects the Microsoft Windows CryptoAPI, which is used to verify the authenticity of secure sockets layer (SSL) certificates produced by the user's computer or server. If a malicious hacker were to exploit this vulnerability, they could create a fake SSL certificate and the user's system would trust it, thus allowing them to access secure data or inject malicious files onto the system.
Microsoft released a patch for the vulnerability in January, but some users are yet to apply it, leaving them vulnerable to attack.
The public release of the exploit is an indication that threat actors are now aware of the vulnerability and can use it to their advantage.
Organizations should ensure their systems are patched as soon as possible and should review any digitally signed programs or certificates to ensure they have not been altered.
Additionally, users should take steps to protect themselves on the internet by avoiding suspicious websites and downloading files only from trusted sources.
This Cyber News was published on www.bleepingcomputer.com. Publication date: Wed, 25 Jan 2023 23:46:02 +0000