In the past, the NSA might have kept the security hole to itself, using it to spy on adversaries. The best examples of that are WannaCry and EternalBlue, Windows 10 vulnerabilities discovered and exploited by the NSA for years. The agency developed hacking tools to exploit those holes, but some of them were uncovered and released by a suspected Russian hacking group called Shadow Brokers. EternalBlue is still used to this day on unpatched systems for ransomware, theft and other types of attacks.
The NSA confirmed that the vulnerability affects Windows 10 and Windows Server 2016. It said that it flagged the dangerous bug because it “makes trust vulnerable.” However, it wouldn’t say when it found the flaw and declined to discuss it further until Microsoft released a patch.
I get the impression that people should perhaps pay very close attention to installing tomorrow’s Microsoft Patch Tuesday updates in a timely manner. Even more so than others.
I don’t know… just call it a hunch?
— Will Dormann (@wdormann) January 13, 2020
According to Krebs, the vulnerability was found in a Windows component called crypt32.dll, which handles “certificate and cryptographic messaging functions,” according to Microsoft. An exploit in that area could affect authentication on Windows desktops and servers, sensitive data on Microsoft’s Internet Explorer and Edge browsers and many third-party applications. Hackers could also use it to spoof digital signatures, making malware look like a legitimate app.
A software patch was released earlier to critical Windows 10 clients including the US military and managers of key internet infrastructure. Microsoft has since released updates for all customers, urging them to install them “as quickly as practical.” As Krebs notes, the company rated the exploitability of the vulnerability as 1 — the second most severe in Microsoft’s rating system. Again, the company confirmed it has not yet been exploited, but is still a major security issue.