Microsoft releases new Patch for 49 vulnerabilities.
Adobe had released a new patch today for vulnerabilities detected in the previous version of Adobe. This patch was released today on Tuesday. So if you have Adobe installed on your Computer please kindly run an update now to avoid vulnerability attack.
Microsoft has also published it's first Patch for the year today in January, this patch is able to cover up for 49 vulnerabilities detected in the previous products.
The new Microsoft patch is able to fix serious vulnerabilities detected in its previous product. one of these vulnerabilities fixes is cryptographic component which is widely used in Windows 10, Server 2016 and 2019 editons respectively, this vulnerability was discovered and reported immediately to the National Security Agency (NSA) in United States .
NSA had discovered a vulnerability in the past which they actually kept secret, that's the Eternalblue SMB flaw, this vulnerability was kept secret for over 5years, which resulted to another vulnerability in 2017 WannaCry menace in 2017.
According to report released by Microsoft , this vulnerability dubbed 'NSSCrypt' and tracked as CVE-2020-0601, which resides in the Crypt32.dllmodule also has different 'Certificates and Cryptographic Messaging functions' this is used by Windows Crypto API for handling encryption and decryption of data.
The module listed above i.e Crypt32.dll module help by validating Eliptic Curve Cryptography (ECC) and Certificates that is currently the industry standard for public-key cryptography and it's used in majority of SSL/TLS certificates
According to NSA, a press release by the agency, it is stated that this vulnerability could allow an attacker to undermine the verification of Windows Cryptography and allow for code execution.
This exploit is able to allow an attacker to abuse validation of trust between .
Two vulnerabilities were found to be able to affect Windows Remote Desktop Gateway (RD GATEWAY) , this vulnerability makes it possible for an attacker to exploit malicious codes to a target just by sending a crafted request via RDP.
Since this vulnerability is pre-authentication ,it allows a target to be able to carry out exploit without the users knowledge .
What's so good about this is, "The vulnerability wasn't detected by attackers who could have manipulated them.
You have anything to say please leave a comment or follow us on facebook or twitter.
Microsoft has also published it's first Patch for the year today in January, this patch is able to cover up for 49 vulnerabilities detected in the previous products.
The new Microsoft patch is able to fix serious vulnerabilities detected in its previous product. one of these vulnerabilities fixes is cryptographic component which is widely used in Windows 10, Server 2016 and 2019 editons respectively, this vulnerability was discovered and reported immediately to the National Security Agency (NSA) in United States .
NSA had discovered a vulnerability in the past which they actually kept secret, that's the Eternalblue SMB flaw, this vulnerability was kept secret for over 5years, which resulted to another vulnerability in 2017 WannaCry menace in 2017.
CVE-2020-0601: Windows CryptoAPI Spoofing Vulnerability
According to report released by Microsoft , this vulnerability dubbed 'NSSCrypt' and tracked as CVE-2020-0601, which resides in the Crypt32.dllmodule also has different 'Certificates and Cryptographic Messaging functions' this is used by Windows Crypto API for handling encryption and decryption of data.
The module listed above i.e Crypt32.dll module help by validating Eliptic Curve Cryptography (ECC) and Certificates that is currently the industry standard for public-key cryptography and it's used in majority of SSL/TLS certificates
According to NSA, a press release by the agency, it is stated that this vulnerability could allow an attacker to undermine the verification of Windows Cryptography and allow for code execution.
This exploit is able to allow an attacker to abuse validation of trust between .
- HTTPS connections
- Signed files and emails
- Signed executable code launched as user-mode processes
"A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates," the microsoft advisory says.
Other Critical RCE Flaws in Windows
Two vulnerabilities were found to be able to affect Windows Remote Desktop Gateway (RD GATEWAY) , this vulnerability makes it possible for an attacker to exploit malicious codes to a target just by sending a crafted request via RDP.
Since this vulnerability is pre-authentication ,it allows a target to be able to carry out exploit without the users knowledge .
What's so good about this is, "The vulnerability wasn't detected by attackers who could have manipulated them.
You have anything to say please leave a comment or follow us on facebook or twitter.