Posts

Showing posts from January, 2024

Exploit released for critical Windows CryptoAPI spoofing bug

Image
  Windows CryptoAPI Spoofing Vulnerability Proof of concept exploit code has been released by Akamai researchers for a critical Windows CryptoAPI vulnerability discovered by the NSA and U.K.'s NCSC allowing MD5-collision certificate spoofing . Tracked as CVE-2022-34689 , this security flaw was addressed with security updates released in August 2022 , but Microsoft only made this public in October, when the advisory was first published. " An attacker could manipulate an existing public x.509 certificate to spoof their identity and perform actions such as authentication or code signing as the targeted certificate, " Microsoft explains. Unauthenticated attackers can exploit this bug (tagged by Redmond as critical severity) in low-complexity attacks. Today, security researchers with the Akamai cloud security firm have published a proof of concept (PoC) exploit and shared an OSQuery to help defenders detect CryptoAPI library versions vulnerable to attacks.  " We have s...