Microsoft Patches Critical ‘NSACrypt’ Flaw Reported by NSA

  • The flaw is believed to affect millions of Windows 10 computers.
  • It resides in the Crypt32.dll module that contains various ‘Certificate and Cryptographic Messaging functions’.

Software giant Microsoft has released security patches for 49 vulnerabilities as part of the January 2020 Patch Tuesday. Out of these 7 have been rated as ‘Critical’ on CVSS score. By far, one of the most notable vulnerabilities is a flaw that was first reported by the National Security Agency (NSA).

The flaw dubbed as ‘NSACrypt’ or ‘Windows CryptoAPI Spoofing’, is believed to affect millions of Windows 10 computers.

More details on ‘NSACrypt’

According to the security advisory published by Microsoft, the flaw resides in the Crypt32.dll module that contains various ‘Certificate and Cryptographic Messaging functions’ used by the Windows Crypto API for data encryption.

An attacker can exploit the flaw to spoof legitimate software, potentially making it easier to run malicious software on a vulnerable computer.

“A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates. An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source,” says Microsoft’s security advisory.

“The user would have no way of knowing the file was malicious because the digital signature would appear to be from a trusted provider,” Microsoft adds.

What are the consequences?

After successfully exploiting unpatched systems, attackers can launch man-in-the-middle attacks as well as decrypt confidential info from user connections to the impacted software.

“This may allow various actions including, but not limited to, interception and modification of TLS-encrypted communications or spoofing an Authenticode signature,” CERT/CC vulnerability analyst Will Dormann explains, Bleeping Computer reported.

How the issue has been addressed?

Both NSA and Microsoft say that the vulnerability has not yet been exploited in the wild. However, due to the classification of the vulnerability, Microsoft has issued patches in the latest Patch Tuesday edition. The technical details of the flaw are not yet available to the public.

“This vulnerability is classed Important and we have not seen it used in active attacks. This vulnerability is classed Important and we have not seen it used in active attacks,” Microsoft Security Response Center says in a blog post.

NSA highlights that the consequences of not patching the vulnerability are severe and widespread.

You May Also Like

4 thoughts on “Microsoft Patches Critical ‘NSACrypt’ Flaw Reported by NSA

  1. Just desire to say your article is as amazing. The clarity in your post is just excellent and i can assume you are an expert on this subject. Well with your permission let me to grab your RSS feed to keep updated with forthcoming post. Thanks a million and please continue the gratifying work.

Leave a Reply

Your email address will not be published. Required fields are marked *


Unique Visitors
» 9,168 Today
» 29,544 Yesterday
» 185,642 This Week
» 869,416 This Month
» 3,562,703 This Year
» 19,797,798 Total (since 2019-12-11)
» Record: 205,757 (2023-08-13)
Counter by DarkWeb.Solutions