heroui logo

Windows CryptoAPI Spoofing Vulnerability (CVE-2020-0601 - CurveBall)

Elastic Detection Rules

View Source
Summary
The detection rule focuses on a vulnerability in Windows CryptoAPI (CVE-2020-0601), which can be exploited by an attacker leveraging spoofed Elliptic Curve Cryptography (ECC) certificates. This vulnerability allows the attacker to sign malicious executables with a falsified code-signing certificate, misleading the system into believing the software originates from a trusted source. The rule is designed to identify exploitation attempts by monitoring specific event logs related to the vulnerability. It uses KQL to query Windows logs for indications of attempts to exploit the vulnerability, specifically looking for events generated by 'Microsoft-Windows-Audit-CVE' that mention CVE-2020-0601. Given the low risk score of 21, this rule is primarily used for threat detection and vulnerability management. The inclusion of defense evasion tactics in the alerting mechanism highlights the potential risks of trust control subversion through code signing. Proper investigation and response steps are outlined to manage alerts effectively and mitigate false positives, including isolating affected systems and applying the latest security patches to address the vulnerability.
Categories
  • Endpoint
  • Windows
Data Sources
  • Logon Session
  • Application Log
  • Network Traffic
ATT&CK Techniques
  • T1553
  • T1553.002
Created: 2020-03-19