CVE-2020-0601

HIGH KEV RANSOMWARE

Microsoft Windows 10 1507 < 1.12.16 - Improper Certificate Validation

Title source: rule

Description

A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.

Exploits (38)

exploitdb WORKING POC
by Oliver Lyak · rubylocalwindows
https://www.exploit-db.com/exploits/47933
nomisec WORKING POC 892 stars
by ly4k · poc
https://github.com/ly4k/CurveBall
nomisec WORKING POC 338 stars
by kudelskisecurity · client-side
https://github.com/kudelskisecurity/chainoffools
nomisec WORKING POC 78 stars
by gentilkiwi · poc
https://github.com/gentilkiwi/curveball
nomisec WORKING POC 65 stars
by saleemrashid · client-side
https://github.com/saleemrashid/badecparams
nomisec WRITEUP 35 stars
by 0xxon · poc
https://github.com/0xxon/cve-2020-0601
nomisec WORKING POC 30 stars
by eastmountyxz · poc
https://github.com/eastmountyxz/CVE-2020-0601-EXP
nomisec WORKING POC 20 stars
by ioncodes · client-side
https://github.com/ioncodes/Curveball
nomisec WORKING POC 5 stars
by 0xxon · poc
https://github.com/0xxon/cve-2020-0601-plugin
nomisec WORKING POC 5 stars
by david4599 · client-side
https://github.com/david4599/CurveballCertTool
nomisec WRITEUP 5 stars
by RrUZi · poc
https://github.com/RrUZi/Awesome-CVE-2020-0601
nomisec WORKING POC 3 stars
by IIICTECH · client-side
https://github.com/IIICTECH/-CVE-2020-0601-ECC---EXPLOIT
nomisec WORKING POC 2 stars
by gremwell · client-side
https://github.com/gremwell/cve-2020-0601_poc
nomisec WORKING POC 2 stars
by YoannDqr · poc
https://github.com/YoannDqr/CVE-2020-0601
nomisec WRITEUP 2 stars
by nissan-sudo · poc
https://github.com/nissan-sudo/CVE-2020-0601
nomisec WORKING POC 1 stars
by Hans-MartinHannibalLauridsen · client-side
https://github.com/Hans-MartinHannibalLauridsen/CurveBall
nomisec WRITEUP 1 stars
by talbeerysec · poc
https://github.com/talbeerysec/CurveBallDetection
nomisec WORKING POC 1 stars
by yanghaoi · client-side
https://github.com/yanghaoi/CVE-2020-0601
nomisec WORKING POC 1 stars
by eastmountyxz · poc
https://github.com/eastmountyxz/CVE-2018-20250-WinRAR
nomisec WRITEUP 1 stars
by Doug-Moody · poc
https://github.com/Doug-Moody/Windows10_Cumulative_Updates_PowerShell
nomisec WRITEUP 1 stars
by BlueTeamSteve · poc
https://github.com/BlueTeamSteve/CVE-2020-0601
nomisec WORKING POC 1 stars
by amlweems · client-side
https://github.com/amlweems/gringotts
nomisec WRITEUP 1 stars
by SherlockSec · poc
https://github.com/SherlockSec/CVE-2020-0601
gitlab WORKING POC
by gavz · poc
https://gitlab.com/gavz/curveball
nomisec WORKING POC
by JoelBts · client-side
https://github.com/JoelBts/CVE-2020-0601_PoC
nomisec WORKING POC
by tyj956413282 · poc
https://github.com/tyj956413282/curveball-plus
nomisec WORKING POC
by okanulkr · client-side
https://github.com/okanulkr/CurveBall-CVE-2020-0601-PoC
nomisec WORKING POC
by exploitblizzard · poc
https://github.com/exploitblizzard/CVE-2020-0601-spoofkey
nomisec WORKING POC
by bsides-rijeka · client-side
https://github.com/bsides-rijeka/meetup-2-curveball
nomisec STUB
by ShayNehmad · poc
https://github.com/ShayNehmad/twoplustwo
nomisec WORKING POC
by apodlosky · poc
https://github.com/apodlosky/PoC_CurveBall
nomisec WORKING POC
by CrackerCat · poc
https://github.com/CrackerCat/CurveballCertTool
nomisec WORKING POC
by 0xxon · poc
https://github.com/0xxon/cve-2020-0601-utils
nomisec WORKING POC
by Ash112121 · poc
https://github.com/Ash112121/CVE-2020-0601
nomisec WORKING POC
by dlee35 · poc
https://github.com/dlee35/curveball_lua
nomisec WORKING POC
by thimelp · poc
https://github.com/thimelp/cve-2020-0601-Perl
nomisec SCANNER
by MarkusZehnle · poc
https://github.com/MarkusZehnle/CVE-2020-0601
nomisec WORKING POC
by JPurrier · poc
https://github.com/JPurrier/CVE-2020-0601

Scores

CVSS v3 8.1
EPSS 0.9410
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Details

CISA KEV 2021-11-03
VulnCheck KEV 2020-01-14
InTheWild.io 2021-07-23
ENISA EUVD EUVD-2020-2099
Ransomware Use Confirmed
CWE
CWE-295
Status published
Products (13)
golang/go 1.12 - 1.12.16
microsoft/windows_10_1507 (2 CPE variants)
microsoft/windows_10_1607 (2 CPE variants)
microsoft/windows_10_1709 (3 CPE variants)
microsoft/windows_10_1803 (3 CPE variants)
microsoft/windows_10_1809 (3 CPE variants)
microsoft/windows_10_1903 (3 CPE variants)
microsoft/windows_10_1909 (3 CPE variants)
microsoft/windows_server_1803
microsoft/windows_server_1903
... and 3 more
Published Jan 14, 2020
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026