Microsoft Patch Tuesday breaks the “NSACrypt” vulnerability in the Windows operating system


The Cybersecurity Advisor of the National Security Agency (NSA)
recently discovered a critical Windows CryptoAPI phishing vulnerability in
Windows 10 operating systems.

Nicknamed NSACrypt, the security flaw found in the Crypt32.dll module
allows remote code execution and affects the way Windows verifies
cryptographic trust

According to the NSA report, the
Vulnerability, tracked as CVE-2020-0601, extends to all Windows 10, Windows Server
2016/2019 and Windows-dependent applications for trusted functionality.

Files and signed emails, HTTPS connections and signed executable
the code launched as processes in user mode are some examples where validation
The process can be exploited by an attacker.

In a successful attack, “the user would have no way of knowing the
the file was malicious, because the digital signature would appear to be from a
trusted provider, “said the report.

How can users and companies protect their systems? As there is no
solution for this type of vulnerability, the “NSA recommends installing all
Tuesday patch of January 2020 patches patches as soon as possible. “
it is not possible for companies, they should at least “prioritize patches
endpoints that provide essential or widely answered services, “as endpoints
directly exposed to the Internet or used by privileged users.

Mechele Gruhn, director of the Microsoft security program
He also confirmed the security flaw in a separate blog post in January.

“This month we addressed the vulnerability CVE-2020-0601 in the
user mode cryptographic library, CRYPT32.DLL, which affects Windows 10 systems “
said Gruhn. “This vulnerability is classified as important and we have not seen it
used in active attacks. “

Eight of the 49 vulnerabilities patched in the January 2020 patch
Tuesday published by Microsoft is marked as critical.

Worthy mentions in this month’s security update batch are also
CVE-2020-0609 and CVE-2020-0610, two
Remote execution errors found in RDP Gateway services that do not require a user
interactions to be exploited by unauthorized parties.

Although the non-exploitation of vulnerabilities has been
reported in the whild, prevention is better than cure, and download the
The latest Windows update is highly recommended.

*** This is a syndicated blog of the Security Bloggers Network of HOTforSecurity, created by Alina Bizga. Read the original post at:


Please enter your comment!
Please enter your name here