Dark Mode

Settings

Capec-475 Detail

Signature Spoofing by Improper Validation

Detailed Software Likelihood: Low Typical Severity: High

Parents: 473

Threats: T59 T263 T271 T292 T307

Description

An adversary exploits a cryptographic weakness in the signature verification algorithm implementation to generate a valid signature without knowing the key.

Extended Description

Signature verification algorithms are generally used to determine whether a certificate or piece of code (e.g. executable, binary, etc.) possesses a valid signature and can be trusted. If the leveraged algorithm confirms that a valid signature exists, it establishes a foundation of trust that is further conveyed to the end-user when interacting with a website or application. However, if the signature verification algorithm improperly validates the signature, either by not validating the signature at all or by failing to fully validate the signature, it could result in an adversary generating a spoofed signature and being classified as a legitimate entity. Successfully exploiting such a weakness could further allow the adversary to reroute users to malicious sites, steals files, activates microphones, records keystrokes and passwords, wipes disks, installs malware, and more.
External ID Source Link Description
CAPEC-475 capec https://capec.mitre.org/data/definitions/475.html
CWE-347 cwe http://cwe.mitre.org/data/definitions/347.html
CWE-327 cwe http://cwe.mitre.org/data/definitions/327.html
CWE-295 cwe http://cwe.mitre.org/data/definitions/295.html
REF-562 reference_from_CAPEC https://blog.lessonslearned.org/chain-of-fools/ Kenn White, Microsoft's Chain of Fools, 2020--01---15, First Principles
REF-563 reference_from_CAPEC https://media.defense.gov/2020/Jan/14/2002234275/-1/-1/0/CSA-WINDOWS-10-CRYPT-LIB-20190114.PDF Patch Critical Cryptographic Vulnerability in Microsoft Windows Clients and Servers, 2020--01---14, National Security Agency (NSA)
REF-564 reference_from_CAPEC https://news.ycombinator.com/item?id=22048619 Thomas Ptacek, Thomas Pornin, Analysis of REF-563, Hacker News

Not present

  1. Recipient is using a weak cryptographic signature verification algorithm or a weak implementation of a cryptographic signature verification algorithm, or the configuration of the recipient's application accepts the use of keys generated using cryptographically weak signature verification algorithms.

Not present

High
Reverse engineering and cryptanalysis of signature verification algorithm implementation

Not present

  1. The Windows CryptoAPI (Crypt32.dll) was shown to be vulnerable to signature spoofing by failing to properly validate Elliptic Curve Cryptography (ECC) certificates. If the CryptoAPI's signature validator allows the specification of a nonstandard base point (G): "An adversary can create a custom ECDSA certificate with an elliptic curve (ECC) signature that appears to match a known standard curve, like P-256 that includes a public key for an existing known trusted certificate authority, but which was in fact not signed by that certificate authority. Windows checks the public key and other curve parameters, but not the (bespoke adversary-supplied) base point generator (G) parameter constant which actually generated the curve" [REF-562]. Exploiting this vulnerability allows the adversary to leverage a spoofed certificate to dupe trusted network connections and deliver/execute malicious code, while appearing as legitimately trusted entity [REF-563]. This ultimately tricks the victim into believing the malicious website or executable is legitimate and originates from a properly verified source. See also: CVE-2020-0601