exploitdb
WORKING POC
by Oliver Lyak · rubylocalwindows
https://www.exploit-db.com/exploits/47933
This exploit demonstrates CVE-2020-0601, a vulnerability in Windows CryptoAPI where an attacker can spoof ECC certificates by manipulating the generator point in the elliptic curve group. The code modifies a CA certificate's public key to create a forged certificate that appears valid.
Classification
Working Poc 95%
Target:
Windows CryptoAPI (CNG.sys)
No auth needed
Prerequisites:
A valid CA certificate file (ca.crt) · OpenSSL library
nomisec
WORKING POC
892 stars
by ly4k · poc
https://github.com/ly4k/CurveBall
This repository contains a proof-of-concept exploit for CVE-2020-0601 (CurveBall), a vulnerability in Windows' cryptographic validation of ECC certificates. It demonstrates how to spoof a trusted CA certificate by manipulating the generator parameter, allowing the creation of fraudulent certificates for code signing or TLS.
Classification
Working Poc 100%
Target:
Microsoft Windows 10 (CryptoAPI)
No auth needed
Prerequisites:
OpenSSL 1.1.0 · Ruby 2.4.0 · Trusted CA certificate (e.g., MicrosoftECCProductRootCertificateAuthority.cer)
nomisec
WORKING POC
338 stars
by kudelskisecurity · client-side
https://github.com/kudelskisecurity/chainoffools
This repository contains a proof-of-concept exploit for CVE-2020-0601, a Windows CryptoAPI spoofing vulnerability. It includes a Python script to generate a rogue private key matching a root certificate's public key on the P-384 curve, enabling the creation of spoofed certificates.
Classification
Working Poc 95%
Target:
Windows CryptoAPI (affects Windows 10, Windows Server 2016/2019, and others)
No auth needed
Prerequisites:
OpenSSL version up to 1.0.2u · Python 3.6 or above · Root certificate on P-384 curve
nomisec
WORKING POC
78 stars
by gentilkiwi · poc
https://github.com/gentilkiwi/curveball
This repository contains a proof-of-concept tool for CVE-2020-0601, which exploits a vulnerability in Windows CryptoAPI by generating an alternative private key for a given ECC certificate. The tool manipulates the EC_GROUP to set the private key to 1, effectively bypassing certificate validation.
Classification
Working Poc 100%
Target:
Windows CryptoAPI (CNG.sys)
No auth needed
Prerequisites:
ECC certificate with a public key
nomisec
WORKING POC
65 stars
by saleemrashid · client-side
https://github.com/saleemrashid/badecparams
This repository contains a proof-of-concept exploit for CVE-2020-0601, a vulnerability in Windows CryptoAPI that allows spoofing of digital signatures. The PoC generates malicious certificates that bypass validation in vulnerable systems, enabling attacks like spoofing TLS certificates and Authenticode signatures.
Classification
Working Poc 100%
Target:
Windows CryptoAPI (affecting Microsoft Edge, Internet Explorer, and Chromium-based browsers)
No auth needed
Prerequisites:
OpenSSL · Python dependencies (ecdsa, asn1crypto) · Vulnerable Windows system without patches
nomisec
WRITEUP
35 stars
by 0xxon · poc
https://github.com/0xxon/cve-2020-0601
This repository provides a Zeek script to detect exploit attempts for CVE-2020-0601 by checking for unknown curves in certificates. It logs suspicious certificates and raises notices but does not contain exploit code.
Classification
Writeup 100%
Target:
Windows CryptoAPI (CVE-2020-0601)
No auth needed
Prerequisites:
Zeek installation · OpenSSL with specific behavior for curve parsing
nomisec
WORKING POC
30 stars
by eastmountyxz · poc
https://github.com/eastmountyxz/CVE-2020-0601-EXP
This repository contains a proof-of-concept exploit for CVE-2020-0601, a vulnerability in Microsoft's CryptoAPI.dll that allows spoofing of ECC certificates. The Ruby scripts demonstrate how to manipulate elliptic curve parameters to forge a certificate that appears valid.
Classification
Working Poc 90%
Target:
Microsoft Windows CryptoAPI (CryptoAPI.dll)
No auth needed
Prerequisites:
A valid ECC certificate to manipulate · Ruby with OpenSSL library
nomisec
WORKING POC
20 stars
by ioncodes · client-side
https://github.com/ioncodes/Curveball
This PoC exploits CVE-2020-0601 (Curveball) by manipulating ECC certificate parameters to create a spoofed trusted certificate. It abuses CryptoAPI's handling of elliptic curve parameters to generate a fake private key that appears valid.
Classification
Working Poc 100%
Target:
Microsoft Windows CryptoAPI (affects Windows 10, Server 2016/2019)
No auth needed
Prerequisites:
Valid ECC-based certificate file · OpenSSL development libraries
nomisec
WORKING POC
5 stars
by 0xxon · poc
https://github.com/0xxon/cve-2020-0601-plugin
This repository provides a Zeek plugin to detect exploit attempts for CVE-2020-0601 by checking for unknown curves in X.509 certificates. It includes a compiled C component that interfaces with OpenSSL 1.1.1 to validate curves against known NIST prime curves.
Classification
Working Poc 90%
Target:
Windows CryptoAPI (CNG.dll)
No auth needed
Prerequisites:
OpenSSL 1.1.1 · Zeek installation
nomisec
WORKING POC
5 stars
by david4599 · client-side
https://github.com/david4599/CurveballCertTool
This repository contains a proof-of-concept exploit for CVE-2020-0601, a vulnerability in Windows CryptoAPI that allows spoofing of elliptic curve cryptography (ECC) certificates. The tool generates a spoofed certificate authority (CA) key and creates a code-signing certificate that appears legitimate but is actually forged.
Classification
Working Poc 95%
Target:
Windows CryptoAPI (affecting Windows 10, Windows Server 2016/2019, and others)
No auth needed
Prerequisites:
OpenSSL · Ruby · osslsigncode · MicrosoftECCProductRootCertificateAuthority.cer
nomisec
WRITEUP
5 stars
by RrUZi · poc
https://github.com/RrUZi/Awesome-CVE-2020-0601
This repository is a curated list of links to other repositories containing PoCs and detection tools for CVE-2020-0601, a vulnerability in Windows CryptoAPI. It does not contain exploit code itself but references external projects.
Classification
Writeup 100%
Target:
Windows CryptoAPI (CVE-2020-0601)
No auth needed
Prerequisites:
Access to referenced external repositories
nomisec
WORKING POC
3 stars
by IIICTECH · client-side
https://github.com/IIICTECH/-CVE-2020-0601-ECC---EXPLOIT
This repository contains a working proof-of-concept exploit for CVE-2020-0601 (CurveBall), which leverages a vulnerability in Windows' ECC certificate validation. The exploit generates a spoofed CA certificate by manipulating the generator parameter, allowing the creation of trusted certificates for code signing or TLS.
Classification
Working Poc 95%
Target:
Microsoft Windows 10 (CryptoAPI)
No auth needed
Prerequisites:
OpenSSL 1.1.0 · Ruby 2.4.0 · Trusted CA certificate (e.g., MicrosoftECCProductRootCertificateAuthority.cer)
nomisec
WORKING POC
2 stars
by gremwell · client-side
https://github.com/gremwell/cve-2020-0601_poc
This repository contains a proof-of-concept exploit for CVE-2020-0601, a vulnerability in the Windows CryptoAPI that allows an attacker to spoof certificates. The tool generates a malicious certificate authority (CA) with the same public key as a trusted CA, enabling man-in-the-middle attacks.
Classification
Working Poc 95%
Target:
Windows CryptoAPI (affected versions of Windows 10, Windows Server 2016/2019)
No auth needed
Prerequisites:
A trusted certificate from a vulnerable Windows system · Network position to intercept traffic
nomisec
WORKING POC
2 stars
by YoannDqr · poc
https://github.com/YoannDqr/CVE-2020-0601
This Ruby script exploits CVE-2020-0601 (CurveBall) to generate rogue certificates that bypass Windows' certificate validation by manipulating elliptic curve parameters. It can create code-signing or TLS certificates to spoof trusted CAs.
Classification
Working Poc 95%
Target:
Windows CryptoAPI (CVE-2020-0601)
No auth needed
Prerequisites:
Trusted CA certificate to spoof · Ruby with OpenSSL library
nomisec
WRITEUP
2 stars
by nissan-sudo · poc
https://github.com/nissan-sudo/CVE-2020-0601
The repository contains only a README.md file mentioning CVE-2020-0601, a remote code execution vulnerability in Citrix ADC and Gateway, but lacks any actual exploit code or technical details.
Classification
Writeup 30%
Target:
Citrix Application Delivery Controller & Gateway
No auth needed
nomisec
WORKING POC
1 stars
by Hans-MartinHannibalLauridsen · client-side
https://github.com/Hans-MartinHannibalLauridsen/CurveBall
This PoC exploits CVE-2020-0601 (CurveBall) by generating a rogue ECC certificate that bypasses Microsoft CryptoAPI's signature validation. It manipulates elliptic curve parameters to create a certificate with the same public key as a legitimate one, enabling spoofing attacks.
Classification
Working Poc 100%
Target:
Microsoft Windows CryptoAPI (Crypt32.dll)
No auth needed
Prerequisites:
A legitimate ECC certificate file
nomisec
WRITEUP
1 stars
by talbeerysec · poc
https://github.com/talbeerysec/CurveBallDetection
This repository contains resources related to the detection of CurveBall (CVE-2020-0601), a vulnerability in Windows CryptoAPI. It references an external article for further details but does not include exploit code or a proof-of-concept.
Classification
Writeup 90%
Target:
Windows CryptoAPI (CVE-2020-0601)
No auth needed
Prerequisites:
knowledge of the vulnerability
nomisec
WORKING POC
1 stars
by yanghaoi · client-side
https://github.com/yanghaoi/CVE-2020-0601
This repository provides a proof-of-concept for CVE-2020-0601, a vulnerability in Windows CryptoAPI (Crypt32.dll) that allows spoofing of code-signing certificates. It includes steps to create a malicious PKCS12 file and sign an executable, demonstrating the vulnerability.
Classification
Working Poc 90%
Target:
Windows CryptoAPI (Crypt32.dll)
No auth needed
Prerequisites:
OpenSSL · osslsigncode · signtool.exe · a vulnerable Windows system
nomisec
WORKING POC
1 stars
by eastmountyxz · poc
https://github.com/eastmountyxz/CVE-2018-20250-WinRAR
This repository contains a Python-based proof-of-concept exploit for CVE-2018-20250, which targets a path traversal vulnerability in WinRAR. The exploit leverages a maliciously crafted ACE archive to extract files to arbitrary locations on the system.
Classification
Working Poc 90%
Target:
WinRAR versions prior to 5.70
No auth needed
Prerequisites:
Victim must extract the maliciously crafted ACE archive using a vulnerable version of WinRAR
nomisec
WRITEUP
1 stars
by Doug-Moody · poc
https://github.com/Doug-Moody/Windows10_Cumulative_Updates_PowerShell
This repository provides a PowerShell script to check and patch systems for CVE-2020-0601 (Curveball vulnerability in Windows 10). It downloads and applies cumulative updates for affected versions.
Classification
Writeup 90%
Target:
Windows 10 (versions 1507-1909, excluding ARM/embedded)
Auth required
Prerequisites:
Administrative access to execute PowerShell scripts · Network access to download updates
nomisec
WRITEUP
1 stars
by BlueTeamSteve · poc
https://github.com/BlueTeamSteve/CVE-2020-0601
This repository is a curated collection of resources, blogs, and Proof of Concepts (PoCs) related to CVE-2020-0601, a critical vulnerability in Microsoft Windows cryptographic functionality. It includes links to PoCs, detection methods, and advisories but does not contain actual exploit code.
Classification
Writeup 100%
Target:
Microsoft Windows 10, Windows Server 2016/2019
No auth needed
nomisec
WORKING POC
1 stars
by amlweems · client-side
https://github.com/amlweems/gringotts
This repository demonstrates a proof-of-concept exploit for CVE-2020-0601, which involves spoofing a trusted root certificate by manipulating elliptic curve parameters in Windows 10's certificate validation process. It generates a fake root CA and signs a leaf certificate to bypass validation.
Classification
Working Poc 95%
Target:
Windows 10 (Certificate Validation)
No auth needed
Prerequisites:
Docker · OpenSSL · Python dependencies (fastecdsa, gmpy2)
nomisec
WRITEUP
1 stars
by SherlockSec · poc
https://github.com/SherlockSec/CVE-2020-0601
This repository contains a README file describing CVE-2020-0601, a Windows CryptoAPI spoofing vulnerability, but lacks actual exploit code or technical details. The included GIF appears to be a placeholder or reused from another CVE.
Classification
Writeup 90%
Target:
Windows CryptoAPI (Windows 10, Windows Server 2016/2019)
No auth needed
Prerequisites:
Access to a vulnerable Windows system · Ability to deliver a spoofed certificate
gitlab
WORKING POC
by gavz · poc
https://gitlab.com/gavz/curveball
This repository contains a functional exploit for CVE-2020-0601 (Curveball), which manipulates elliptic curve cryptography parameters to forge a trusted certificate. The tool generates an alternative private key for a given public certificate, exploiting a vulnerability in Windows CryptoAPI.
Classification
Working Poc 100%
Target:
Windows CryptoAPI (Crypt32.dll)
No auth needed
Prerequisites:
Public certificate file (PEM format) · OpenSSL library for compilation
nomisec
WORKING POC
by JoelBts · client-side
https://github.com/JoelBts/CVE-2020-0601_PoC
This repository contains a proof-of-concept for CVE-2020-0601, a vulnerability in Windows CryptoAPI that allows spoofing of elliptic curve cryptography (ECC) certificates. The PoC demonstrates how to generate a spoofed CA key and use it to sign TLS certificates or code-signing certificates, bypassing trust validation.
Classification
Working Poc 95%
Target:
Windows CryptoAPI (CVE-2020-0601)
No auth needed
Prerequisites:
Python 3.11 · OpenSSL 3.1 · osslsigncode 2.5 · Trusted root certificate in PEM format (secp384r1)
nomisec
WORKING POC
by tyj956413282 · poc
https://github.com/tyj956413282/curveball-plus
This repository contains a proof-of-concept for CVE-2020-0601 (Curveball), demonstrating how to forge certificates by exploiting a vulnerability in Windows' cryptographic validation of ECC certificates. The code includes key generation, certificate forging, and validation bypass techniques.
Classification
Working Poc 90%
Target:
Windows CryptoAPI (CVE-2020-0601)
No auth needed
Prerequisites:
OpenSSL development libraries · Basic understanding of ECC cryptography
nomisec
WORKING POC
by okanulkr · client-side
https://github.com/okanulkr/CurveBall-CVE-2020-0601-PoC
This PoC exploits CVE-2020-0601 (CurveBall) by generating a spoofed ECC certificate that bypasses Windows' certificate validation. It manipulates the public key and generator to create a fraudulent CA, enabling code signing of malicious executables.
Classification
Working Poc 95%
Target:
Windows CryptoAPI (affects Windows 10, Windows Server 2016/2019, and others)
No auth needed
Prerequisites:
Trusted ECC certificate (e.g., Microsoft ECC Product Root Certificate Authority) · OpenSSL · Ruby
nomisec
WORKING POC
by exploitblizzard · poc
https://github.com/exploitblizzard/CVE-2020-0601-spoofkey
This PoC exploits CVE-2020-0601 (Windows CryptoAPI Spoofing Vulnerability) by generating a spoofed certificate authority (CA) key. It manipulates the elliptic curve parameters to create a fake private key that can be used to sign malicious code as if it were from a trusted source.
Classification
Working Poc 90%
Target:
Windows CryptoAPI (CVE-2020-0601)
No auth needed
Prerequisites:
OpenSSL · Ruby · A valid CA certificate file
nomisec
WORKING POC
by bsides-rijeka · client-side
https://github.com/bsides-rijeka/meetup-2-curveball
This repository contains a proof-of-concept exploit for CVE-2020-0601, a vulnerability in Windows CryptoAPI that allows spoofing of elliptic curve cryptography (ECC) certificates. The exploit generates a spoofed CA certificate and demonstrates a man-in-the-middle (MITM) attack using a Node.js proxy server.
Classification
Working Poc 100%
Target:
Windows 10 CryptoAPI (versions affected by CVE-2020-0601)
No auth needed
Prerequisites:
Unpatched Windows 10 system (CVE-2020-0601 unpatched) · Ability to intercept or redirect TLS traffic
nomisec
STUB
by ShayNehmad · poc
https://github.com/ShayNehmad/twoplustwo
This repository claims to implement CVE-2020-0601 (Windows CryptoAPI Spoofing Vulnerability) but only contains a basic Flask server with SSL. No exploit logic or PoC for the vulnerability is present.
Target:
Windows CryptoAPI (CVE-2020-0601)
No auth needed
Prerequisites:
None, as no actual exploit is implemented
nomisec
WORKING POC
by apodlosky · poc
https://github.com/apodlosky/PoC_CurveBall
This is a proof-of-concept exploit for CVE-2020-0601 (CurveBall), a vulnerability in Windows' cryptographic validation of ECC certificates. The PoC generates a spoofed certificate by manipulating the elliptic curve parameters to bypass validation.
Classification
Working Poc 95%
Target:
Windows CryptoAPI (affects Windows 10, Windows Server 2016/2019, and others)
No auth needed
Prerequisites:
A vulnerable Windows system · A valid ECC certificate to spoof
nomisec
WORKING POC
by CrackerCat · poc
https://github.com/CrackerCat/CurveballCertTool
This repository contains a functional exploit for CVE-2020-0601 (Curveball), which abuses a flaw in Windows' cryptographic validation of ECC certificates. The tool generates a spoofed CA certificate and signs executables, bypassing trust validation.
Classification
Working Poc 95%
Target:
Windows CryptoAPI (affects Windows 10, Windows Server 2016/2019)
No auth needed
Prerequisites:
OpenSSL · Ruby · osslsigncode · MicrosoftECCProductRootCertificateAuthority.cer
nomisec
WORKING POC
by 0xxon · poc
https://github.com/0xxon/cve-2020-0601-utils
This repository contains utility code for CVE-2020-0601, a Windows CryptoAPI spoofing vulnerability. It includes OpenSSL curve data and a base64 encoding/decoding library, likely used to generate malicious certificates or test exploit scenarios.
Classification
Working Poc 80%
Target:
Windows CryptoAPI (CVE-2020-0601)
No auth needed
Prerequisites:
Access to generate or modify certificates · Target system vulnerable to CVE-2020-0601
nomisec
WORKING POC
by Ash112121 · poc
https://github.com/Ash112121/CVE-2020-0601
This PoC exploits CVE-2020-0601, a vulnerability in Windows CryptoAPI where spoofed ECC certificates can bypass validation. It manipulates the generator of an elliptic curve group to forge a certificate that appears valid.
Classification
Working Poc 90%
Target:
Windows CryptoAPI (CNG.sys)
No auth needed
Prerequisites:
A vulnerable Windows system · A spoofed ECC certificate
nomisec
WORKING POC
by dlee35 · poc
https://github.com/dlee35/curveball_lua
This repository contains a Lua script designed to detect exploit attempts for CVE-2020-0601 (Curveball) by analyzing TLS handshake traffic for improper ECC curve usage. The script checks for known ECC cryptography suites and alerts if suspicious patterns are found.
Classification
Working Poc 90%
Target:
Windows CryptoAPI (CVE-2020-0601)
No auth needed
Prerequisites:
Network traffic capture capability · TLS handshake data
nomisec
WORKING POC
by thimelp · poc
https://github.com/thimelp/cve-2020-0601-Perl
This Perl script exploits CVE-2020-0601 by converting a public key from a certificate into a fake private key, leveraging a vulnerability in Windows CryptoAPI. It manipulates elliptic curve cryptography parameters to forge a private key that can be used to spoof signatures.
Classification
Working Poc 95%
Target:
Windows CryptoAPI (Crypt32.dll)
No auth needed
Prerequisites:
A certificate file with a public key
nomisec
SCANNER
by MarkusZehnle · poc
https://github.com/MarkusZehnle/CVE-2020-0601
This PowerShell script checks if the hotfix for CVE-2020-0601 is installed on a Windows system and scans for exploitation attempts via Event Log entries. It does not exploit the vulnerability but verifies patch status and potential attack indicators.
Classification
Scanner 100%
Target:
Windows 10 (various versions) and Windows Server (2016, 2019, etc.)
Auth required
Prerequisites:
Local or administrative access to the target Windows system
nomisec
WORKING POC
by JPurrier · poc
https://github.com/JPurrier/CVE-2020-0601
This PowerShell script automates the deployment of patches for CVE-2020-0601 (Windows CryptoAPI Spoofing Vulnerability) across multiple servers in an Active Directory environment. It checks server build numbers and installs the appropriate patch for Windows Server 2016 or 2019.
Classification
Working Poc 90%
Target:
Windows Server 2016 (Build 14393), Windows Server 2019 (Build 17763)
Auth required
Prerequisites:
Active Directory access · Administrative privileges on target servers · Network access to target servers · Patch files available on a shared location