Chain of Fools: What We Know So Far on Windows CryptoAPI Spoofing Vulnerability

栏目: IT技术 · 发布时间: 4年前

内容简介:On Monday this week, Brian KrebsTL;DR: patch.This morning around 10 a.m. ET, the Washington Post's

On Monday this week, Brian Krebs broke a story that the NSA had discovered a critical flaw in Microsoft Windows software responsible for core security functions including, among other responsibilities, verifying the identity of other computers on local networks and the internet as well as assuring the authenticity and provenance of code being installed on a machine. When Microsoft was alerted by the NSA of this vulnerability, the potential security impact was apparently so high that as soon as patches were ready, they were made available ahead of the public notification to military and "other high-value customers/targets that manage key Internet infrastructure" under strict non-disclosure agreement. While this in itself is not uncommon, it did underscore the urgency in mitigating a serious widespread security bug.

Chain of Fools: What We Know So Far on Windows CryptoAPI Spoofing Vulnerability
credit Pete Risby

TL;DR: patch.

This morning around 10 a.m. ET, the Washington Post's Ellen Nakashima published a report with sources confirming the disclosure, initially with an emphasis on code signing and then later in the day updating the story to clarify that the real threat was "an error in the software code that fails to properly check the authenticity [of network communications]", in other words cryptographic certificate spoofing; a failure in the trust chain that ensures your computer is talking to who it thinks it's talking to (or is about to install software that was actually written by those who you believe wrote it).

This post is a quick day one recap of what we know so far about CVE-2020-0601, what Microsoft has dubbed the Windows CryptoAPI Spoofing Vulnerability . I haven't heard a catchy name yet, so I vote for Chain of Fools with a dutiful nod to the queen of soul, Aretha Franklin. The analyses presented (my own included) are only as good as the information we have on hand, which so far is still fairly thin on technical details. This is by no means intended to be exhaustive or authoritative, just a curated selection of information sources from people who are technically credible or experts in the field.

First, the official advisory itself: The Windows CryptoAPI Spoofing Vulnerability

A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates. An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source. The user would have no way of knowing the file was malicious, because the digital signature would appear to be from a trusted provider. A successful exploit could also allow the attacker to conduct man-in-the-middle attacks and decrypt confidential information on user connections to the affected software.

  • Microsoft rates this as Severity: Important, with CVSS scores of 8.1/7.3
  • Affected systems: Windows 10, Windows Server 2016 & 2019
  • Some early reporting (including Krebs) had suggested that "all versions" of Windows going back 20 years was impacted. That seems not to be the case. According to NSA, the bug was introduced in July 2015.
  • Part of the confusion is that this particular software library, crypt32.dll has in fact been a core component of Windows going back all the way to NT . Why Windows 7, 8, and 8.1 and earlier server versions are unaffected isn't completely clear, though there have been some interesting theories. More on that in a bit.

Around noon Eastern today, by plan, NSA held a briefing with members of the media, and immediately thereafter Microsoft released the official advisory, followed up shortly by NSA's own advisory:

National Security Agency Cybersecurity Advisory: Patch Critical Cryptographic Vulnerability in Microsoft Windows

NSA assesses the vulnerability to be severe and that sophisticated cyber actors will understand the underlying flaw very quickly... Consequences of not patching the vulnerability are severe and widespread.

Shortly thereafter, CERT published their alert: Vulnerability Note VU#849224 : Microsoft Windows CryptoAPI fails to properly validate ECC certificate chains, emphasizing that this directly affects X.509 certificate chains - the cornerstone of trust in any networked computer.

Today, DHS published an emergency directive, 20-02 advising federal agencies to patch within 10 days. And in an unexpected twist included mandates on remote desktop access (RDP) vulnerabilities as well. DHS cited other CVEs announced by Microsoft today, including CVE-2020-0609, CVE-2020-0610, and CVE-2020-0611 as no-auth-required remote code execution. So full RCE plus certificate chain validation. What a way to start the day.  

You may be asking yourself, "What the heck is a certificate chain validation?" Glad you asked. I illustrated this on twitter today thusly:

X.509 Validation Spoofs Explained via Interpretive Meme
Chain of Fools: What We Know So Far on Windows CryptoAPI Spoofing Vulnerability

Maybe the school kid here has a sharp eyed teacher who actually bothered to check the signatures [verdict: not legit; how it's supposed to work]. Or maybe they have a substitute that day who was phoning it in [verdict: lgtm; how Windows apparently works].

Enough with the fun and games, Kenn. I want the DEETS plz.

Okay, fine. I'll stipulate that most of my readers are probably not here for the Muggle version. Here goes.

From Crowdstrike's co-founder:

Potential impact of CVE-2020-0601:

- Remote Code Execution (due to auth bypass)

- Compromise of HTTPs authentication

- Spoofing code signing (in user-mode)

- Spoofing content signing

Source: https://t.co/ZgoIRUAe7B

— Dmitri Alperovitch (@DAlperovitch) January 14, 2020

Thomas Ptacek ( @tqbf ) has written what I think is the best technical analysis of the cryptography with the information at present. You should read it, or at least pass it along to your neighborhood crypto nerd security team person.

In short, it appears that an attacker can create a custom ECDSA certificate with an ellipic curve (ECC) signature that appears to match a known standard curve, like P-256 that includes a public key for an existing known trusted certificate authority, but which was in fact not signed by that certificate authority. Windows checks the public key and other curve parameters, but not the (bespoke attacker-supplied) base point generator ( G ) parameter constant which actually generated the curve. Low-level code within the foundation of the operating system is accepting the attacker's stated identity ( "Hi! I'm Google!" ) as genuine on the basis of incomplete checks. With a rogue ECDSA certificate, any number of network comms are at risk. And that is a problem.

Chain of Fools: What We Know So Far on Windows CryptoAPI Spoofing Vulnerability

Cem Paya has some interesting insights in this thread as to why earlier versions of Windows might have skated by unscathed:

Some speculation on CVE-2020-0601.

Earlier version of Windows cryptography API only supported a handful of elliptic curves from NIST suite-B.

It could not handle say an arbitrary prime-curve in Weierstrass form with user defined parameters

1/N

— Cem Paya (@randomoracle) January 14, 2020

Cas Cremers reminds us that what's old is new again, citing original work of Serge Vaudenay and Thomas Pornin in this thread:

It looks like it exploits what Vaudenay warned against in 2004 : "Digital Signature Schemes with Domain Parameters" ( https://t.co/aTy4d2XhFd ) https://t.co/unKi8p2cDO

— Cas Cremers (@CasCremers) January 14, 2020

At the end of Cas' thread above, he manages to fit the attack formula into a single tweet:

1. Find an ecc root cert C with pk

2. Apply Vaudenay|(Pornin&Stern) 2004 get C' with sk',params' for that pk

3. Create a normal code signing cert C'' with key pair (pk'',sk'') and sign software with sk''

4. Sign C'' with sk'

5. Present software,C'',C' to windows' sigcheck64.exe

— Cas Cremers (@CasCremers) January 15, 2020

And Thai Duong (who brought us the BEAST, CRIME, and POODLE attacks on SSL) points out that RFC5480 requires that user-supplied custom curve parameters from a "known" curve must not be blindly trusted.

Wow. So this is not a boring parsing bug. My guess is that Windows blindly trusted curve parameters from a rogue certificate. This is interesting because https://t.co/oa67lTmf3z states that " This choice [specified curve parameters] MUST NOT be used" https://t.co/VyIdhvCTqc

— thaidn (@XorNinja) January 14, 2020

So, what do we know so far about the patch? This is a crucial detail in the analysis - examining the delta between the patch and previous machine code to understand exactly which parts of the codebase is affected. From the looks of it, this is a fairly circumscribed fix (which makes sense given how vital it is not to introduce any breaking changes).

OK, this explains the call to ChainComparePublicKeyParametersAndBytes() in ChainGetSubjectStatus(): pic.twitter.com/73kigQtgw9

— Ralf (RPW) (@esizkur) January 14, 2020

So CVE-2020-0601 is quite a small diff and there's a few things that stick out, like changing a simple memcmp call to a new "ChainComparePublicKeyParametersAndBytes" function.

— John Simpson (@thracky) January 14, 2020

The vulnerable function is here https://t.co/g2BqNCLoP5 - you have to create an ECDSA chain like below but using an actual valid CA chain like microsoft_root_ca_2010.cer / production_pca_2011.cer and then sign it. I don't see a way to do it without some custom PE overlay tools https://t.co/R8krZvQE0X

— Hacker Fantastic (@hackerfantastic) January 14, 2020

Some interesting debate in the community around the practical risk to the Windows Update system ("WU") including former GCHQ signals specialist and ex-Google Project Zero member Matt ( @pwnallthethings ) Tait, Windows internals expert and Crowdstrike's head of EDR, Alex Ionescu, and DNS guru Dan Kaminski. There are some strong claims that Windows Update now includes additional security precautions, specifically checking the fingerprint of certain high-value system RSA certificates (in this case Microsoft) via "pinning", in which the precise hash of a known authority and of the endpoint or a binary package's certificate itself is doubly verified. Sort of the digital equivalent of checking biometric signatures against a database of known images that are baked in to the OS. Based on the threads below, I remain skeptical that there's a direct live path for WU exploits, but one could easily imagine indirect paths where the flaw allows arbitrary software to be installed outside Windows Update which could replace or remove the checking functions themselves. It might not be as elegant, but it gets the job done.

Catching up here but let me confirm: no you can’t attack WU with this.

— Alex Ionescu (@aionescu) January 14, 2020

WU pins to an RSA PK Hash

— Alex Ionescu (@aionescu) January 14, 2020

I think it would work if WSUS is being used. It would be a variant on this (wsuspect-proxy) attack but you would exploit the CVE to MITM the TLS connection between the client and WSUS server - https://t.co/zbSBcJjcTs

— WorkflowXoml (@WorkflowX) January 15, 2020

There are already detection signatures available from security vendors and even through the Windows Event Manager:

No fancy EDR required to capture CVE-2020-0601 attempts (after patching). Just ensure you're forwarding Application log events. Currently, CVE-2020-0601 is the only Microsoft code (AFAIK) that calls the CveEventWrite API so event noise is not a concern. https://t.co/DwRqboJA7C pic.twitter.com/JWPnaMaIqB

— Matt Graeber (@mattifestation) January 14, 2020

Thanks to some amazing last-minute work by multiple teams, I'm happy to share that @CrowdStrike Falcon detects exploitation attempts of CVE-2020-0601 and shows the Certificate Authority, SHA-1 of the malicious certificate, and ECC curve parameters. More details in our Tech Alert pic.twitter.com/EHYIVVG4c7

— Alex Ionescu (@aionescu) January 14, 2020

And some good news. For those who rely on Microsoft's own anti-virus and malware protections via Windows Defender, malicious files signed with bogus certs that have tell-tale characteristics of the 2020-0601 curve exploits are now detected and inoculated in real time.

Windows Defender Antivirus detects files w/crafted certificates exploiting the certificate validation vulnerability:

​Exploit:Win32/CVE-2020-0601.A (PE files)

Exploit:Win32/CVE-2020-0601.B (Scripts)

Also, #Microsoft Defender ATP has a threat report on your posture. #CVE -2020-0601 pic.twitter.com/dFqJV5za8F

— Amitai Rottem (@AmitaiTechie) January 14, 2020

As far as working Proofs of Concept (PoCs), famed UK hardware hacker Saleem Rashid and many others are on the case, and my guess is we'll see working code in circulation within the next 24 hours. Saleem is already well on the way.

Chain of Fools: What We Know So Far on Windows CryptoAPI Spoofing Vulnerability
Via Saleem Rashid

I shared some thoughts with Wired on the story today:

Windows 10 Has a Security Flaw So Severe the NSA Disclosed It

In a shift toward transparency, the National Security Agency announced a bug that could have left over 900 million PCs vulnerable to attack.

Lily Hay Newman WIRED

Chain of Fools: What We Know So Far on Windows CryptoAPI Spoofing Vulnerability

"This is a core, low-level piece of the Windows operating system and one that establishes trust between administrators, regular users, and other computers on both the local network and the internet. If the technology that ensures that trust is vulnerable, there could be catastrophic consequences. But precisely what scenarios and preconditions are required—we're still analyzing. It will be a long day for a lot of Windows administrators around the world."

As for the long-term lessons here, I think Matt Green summed it up best:

I know it’s trite to say this (again). But if the cryptographic A-team is willing to accept random elliptic curve parameters from strangers, imagine what kind of mistakes the B-team will make when you ask them to design crypto backdoors.

— Matthew Green (@matthew_d_green) January 14, 2020

Be safe out there folks. (And patch, patch, patch!)

Post-publication update: Remember that "other" bug I mentioned, the nasty no-auth Remote Desktop Protocol Gateway remote code execution ? Yeah, about that...

Got a crash PoC working for one of the Remote Desktop Gateway bugs. Will probably do a write up tomorrow. pic.twitter.com/SmH2L3gVxn

— MalwareTech (@MalwareTechBlog) January 15, 2020

I thought you were my man

But I found out

I'm just a link in your chain

You got me where you want me

I ain't nothin' but your fool

Ya treated me mean

Oh you treated me cruel

Chain, chain, chain

(Chain, chain, chain)

Chain of fools

— Ms. Aretha Franklin


以上所述就是小编给大家介绍的《Chain of Fools: What We Know So Far on Windows CryptoAPI Spoofing Vulnerability》,希望对大家有所帮助,如果大家有任何疑问请给我留言,小编会及时回复大家的。在此也非常感谢大家对 码农网 的支持!

查看所有标签

猜你喜欢:

本站部分资源来源于网络,本站转载出于传递更多信息之目的,版权归原作者或者来源机构所有,如转载稿涉及版权问题,请联系我们

.NET框架程序设计

.NET框架程序设计

(美)Jeffrey Richter、(美)Francesco Balena / 李建忠 / 华中科技大学出版社 / 2004-1 / 54.00元

Microsoft.NET框架为简化开发与卫联网无缝连接的应用程序和组件提供了强大的技术支持,如ASP.NET Web窗体、XML Web服务以及Windows窗体。本书的目的在于展示.NET框架中公共语言运行库存的核心内容。全书由两位广受尊敬的开发者/作者完成,并假设读者理解面向对象程序设计的基本概念,如数据抽象、继承和多态。书中内容清楚地解释了CLR的扩展类型系统,CLR如何管理类型的行为,以......一起来看看 《.NET框架程序设计》 这本书的介绍吧!

在线进制转换器
在线进制转换器

各进制数互转换器

UNIX 时间戳转换
UNIX 时间戳转换

UNIX 时间戳转换

HEX CMYK 转换工具
HEX CMYK 转换工具

HEX CMYK 互转工具