[Nulled] » Programming » Hacking » The CryptoAPI vulnerability has been given a second life and most Windows-based
January 26 2023

The CryptoAPI vulnerability has been given a second life and most

The CryptoAPI vulnerability has been given a second life and most Windows-based data center systems and applications still remain vulnerable.

We are talking about the bug CVE-2022-34689, which was revealed last year by the NSA and the British NCSC, after Microsoft fixed it without too much hype.

The bug closed in August 2022, although it was marked as critical, but received a CVSS rating of only 7.5 out of 10 from Microsoft.

The thing is that the problem may have been used by specially trained actors, but quite quietly and locally.

However, experts from Akamai added fuel to the fire by publishing a PoC exploit, which seriously excited Microsoft, which will now have to reconsider its conclusions.

Recall that CryptoAPI helps developers protect Windows applications using cryptography, and the API can be used, for example, to verify certificates and identification.

The vulnerability itself can be used by attackers to digitally sign malicious executable files in such a way that Windows and applications believe that the files are obtained from reliable and legitimate sources and can be opened or installed.

The PoC demo works with an old version of Chrome for Windows that uses CryptoAPI to validate certificates. When implementing a MITM attack, you can make the browser think that it is communicating with a legitimate server for an HTTPS website, but in fact a malicious fake is being used. 

Akamai claims that the vast majority of public Windows-based servers in data centers around the world that she studied have not been fixed, but notes that in order for the error to be used in practice, an application or service using CryptoAPI must be running on the device in such a way that it can be spoofed.

At the moment, experts have discovered that old versions of Chrome (v48 and earlier) and Chromium-based applications can be hacked.

Information

Visitors who are in the group Guests they can't download files.
Log in to the site under your login and password or if you are a new user go through the process registrations on the website.

Comments:

    1. Oscar (🆄🆂🅴🆁)

      28 March 2024 07:50 22 commenti

      Great thanks

Information the publication:

  • Author of the publication: AdequateSchizo
  • Date of publication: 26 January 2023 12:16
  • Publication category(s): Programming»,Hacking
  • Number of views of the publication: 184
  • Number of comments to the publication: 1

Related News

16 January 2023
Information security
Microsoft's January

Microsoft's January PatchTuesday was released with fixes for a record 98 documented software vulnerabilities.

Read more
16 January 2023
Information security
Microsoft, as usual,

Microsoft, as usual, quietly fixed an important security vulnerability in the Azure service (ACS) after

Read more
16 January 2023
Information security
Experts warn of a

Experts warn of a critical vulnerability of the Linux kernel of 10 points on the CVSS scale, which affects SMB

Read more
16 January 2023
Information security
Auth0 fixed an RCE

Auth0 fixed an RCE vulnerability in the popular open source library JsonWebToken, which was used in more than

Read more
23 January 2023
Information security
Popular WordPress

Popular WordPress plugins are vulnerable to serious or critical SQL injection vulnerabilities for which PoC

Read more

Information

Users of 🆅🅸🆂🅸🆃🅾🆁 are not allowed to comment this publication.

Site Search

Site Menu


☑ Websites Scripts

Calendar

«    December 2024    »
MonTueWedThuFriSatSun
 1
2345678
9101112131415
16171819202122
23242526272829
3031 

Advertisement

Survey on the website

Evaluate the work of the site
 

Statistics

  • +7 Total articles 6751
  • +16 Comments 4234
  • +31 Users : 6069