CVE-2020-0601

Scores

EPSS

0.941high94.1%
0%20%40%60%80%100%

Percentile: 94.1%

CVSS

8.1high3.x
0246810

CVSS Score: 8.1/10

All CVSS Scores

CVSS 3.x
8.1

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

CVSS 2.0
5.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Description

A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka ‘Windows CryptoAPI Spoofing Vulnerability’.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

msrcnvdredhat

CWEs

CWE-295

Related Vulnerabilities

Exploits

Exploit ID: CVE-2020-0601

Source: cisa

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Exploit ID: 47933

Source: exploitdb

URL: https://www.exploit-db.com/exploits/47933

Vulnerable Software (23)

Type: Configuration

Product: golang

Operating System: altlinux

Trait:
{  "fixed": "0:1.13.8-alt1"}

Source: redhat

Type: Configuration

Product: golang-docs

Operating System: altlinux

Trait:
{  "fixed": "0:1.13.8-alt1"}

Source: redhat

Type: Configuration

Product: golang-gdb

Operating System: altlinux

Trait:
{  "fixed": "0:1.13.8-alt1"}

Source: redhat

Type: Configuration

Product: golang-shared

Operating System: altlinux

Trait:
{  "fixed": "0:1.13.8-alt1"}

Source: redhat

Type: Configuration

Vendor: *

Product: go

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",          "versionEndExcluding": "1.12.16",          "versionStartIncluding": "1.12...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_10_1507

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_10_1607

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_10_1709

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_10_1803

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_10_1809

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_10_1903

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_10_1909

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_server_1803

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_server_1903

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_server_1909

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_server_2016

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Configuration

Vendor: *

Product: windows_server_2019

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*...

Source: nvd

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 16299.1625

Operating System: Windows 16299 build 1625

Identifier: KB4534276

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 17763.973

Operating System: Windows 17763 build 973

Identifier: KB4534273

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 17134.1246

Operating System: Windows 17134 build 1246

Identifier: KB4534293

Source: msrc