An Old NSA-Found Security Threat Is Still Menacing Windows Users And Data Centers

nsa discovered cryptoapi security vulnerability gains poc
In 2022, the National Security Agency, in conjunction with the U.K’s National Cyber Security Centre, reported a critical vulnerability in the Windows CryptoAPI to Microsoft. While this was patched in August of 2022 and published in October of 2022, it could still prove to be a problem as threat actors could still leverage the vulnerability in data centers and homes worldwide.

The vulnerability, tracked as CVE-2022-34689, has a Common Vulnerability Scoring System (CVSS) score of 7.5, thanks to various metrics. While this score is not wholly indicative of the dangers of this vulnerability, it is a basis for concern. Namely, if exploited, this vulnerability could allow an attacker to pose as a legitimate entity with valid certificates used in code signing or verification.

explanationof nsa discovered cryptoapi security vulnerability

Akamai, the team behind the newly published research and proof-of-concept exploit code for CVE-2022-34689, reports that an attacker could mask their identity and bypass various security protections. This is thanks to a change in the crypt32.dll with the singular function “CreateChainContextFromPathGraph,” wherein lies a check to see if a certificate is already in the cache and subsequently verified. Before a patch fixed the vulnerability, this check would use an MD5 thumbprint of the received certificate and compare that against those in the cache.

It was theorized that, given long-standing collision problems with MD5, it would be possible to serve a certificate whose thumbprint matches one in the cache. Now, the Akamai team has proven this with proof-of-concept code that bypassed one check and made Windows believe the malicious certificate was a trusted one.
POC nsa discovered cryptoapi security vulnerability

Per the report, a lot of code that uses the CryptoAPI could be exposed to this vulnerability which could require patches for even discontinued versions of Windows, such as Windows 7. Further, it is noted that “fewer than 1% of visible devices in data centers are patched, rendering the rest unprotected from exploitation of this vulnerability.” However, this is not quite as scary as it first seems, as there is a limited scope of vulnerable applications and Windows components that meet the criteria for exploitation.

In any event, research is ongoing into the vulnerability, but it is not expected to be anything like the CurveBall vulnerability, which the NSA also discovered. This does not mean you should not update your systems, though, as vulnerabilities like this will continue to come back and haunt us if not properly addressed.