• There’s a working Proof of Concept for the “ChainOfFools” CVE-2020-0601 Crypto API bug — but it isn’t as bad as you think

    Home » Forums » Newsletter and Homepage topics » There’s a working Proof of Concept for the “ChainOfFools” CVE-2020-0601 Crypto API bug — but it isn’t as bad as you think

    Author
    Topic
    #2085689

    Long story short, Yolan Ronmailler has posted a working Proof of Concept for NSA’s CVE-2020-0601 Crypt43 bug. The code is available on Github. There’s
    [See the full post at: There’s a working Proof of Concept for the “ChainOfFools” CVE-2020-0601 Crypto API bug — but it isn’t as bad as you think]

    4 users thanked author for this post.
    Viewing 2 reply threads
    Author
    Replies
    • #2085916

      Woody, I really can’t agree with you here on downplaying the severity of this vulnerability.

      In order for it to work, the victim first has to visit a site that has a clean copy of the certificate that the attacker has subverted, and then visit the site with the subverted certificate. Unless the attacker has full control over your network, the chances of that happening are slim indeed.

      This is not any more difficult than a conventional man in the middle attack. If an attacker is already man in the middling you, all they have to do is transparently proxy a legitimate web page first (without the ability to see or modify the content), and then attack subsequent requests. This attack is not any harder to exploit compared to other man in the middle attacks.

      E.g. attack google search by transparently proxying homepage and then intercepting the new request when a user searches. You can’t modify the homepage initially, but you can modify the results.

      While we know that Chrome requires the user to visit a clean site to cache the certificate first, what about classic edge? What about software programs that auto-update and already have a cached copy of the certificate?

      All these quotes are saying is that man-in-the-middle is less dangerous than remote code execution, which is true. The minor hurdle to exploitation is not much of a hurdle at all.

      This problem is so trivial and the patch so simple that it is unlikely to cause problems, and it should be safe to tell users to update immediately. The potential attack surface on third-party applications that use the Windows crypto API is broad.

      2 users thanked author for this post.
    • #2085937

      Would someone be able to please explain what keeps this from effecting Windows 7?

      I feel as if I’ve missed something very obvious in everything I’ve read.

      Is it as simple as the Crypto API not working the same between Windows 7 & 10?

      • #2085943

        Win7 doesn’t use the same Crypto verification sequence. It isn’t at risk.

        2 users thanked author for this post.
        • #2085946

          Wow, I did not expect it to actually be that simple.

          • This reply was modified 5 years, 4 months ago by Moonbear.
    • #2086045

      Win7 doesn’t use the same Crypto verification sequence. It isn’t at risk.

      Is that also true for Windows 8?

      Win 10 ver. 22H2 x64

    Viewing 2 reply threads
    Reply To: There’s a working Proof of Concept for the “ChainOfFools” CVE-2020-0601 Crypto API bug — but it isn’t as bad as you think

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: