Big Microsoft day: EOL for Win7, Win2008 and crypt32.dll

Big Microsoft day: EOL for Win7, Win2008 and crypt32.dll. Big Microsoft day. End-of-life for Windows 7 desktops and Windows 2008 servers (strictly speaking Windows Server 2008 R2). I think that today many security guys had a fun task to count how many host hosts with win7 and win2008 they still have in the organization. So, Asset Management is a necessity! ?

Windows 7 desktop

Now an interesting time should begin, when critical unpatched vulnerabilities may appear for these operation systems. At the same time, the number of hosts with Windows 7 and Windows 2008 will be still big enough for massive attacks. ? Although I think that Microsoft will continue to release patches for the most critical vulnerabilities, like they did it for WinXP. Upd. Also note, that for Windows Server 2008/2008r2 it’s also possible to purchase an extended three years  security update subscription.

Windows 2008 server

The second interesting topic is the mysterious vulnerability in crypt32.dll (this dll appeared in Windows more than 20 years ago), which might somehow affect authentication and digital signatures in Windows.

crypt32.dll

Far now it has been only a rumor, but soon it will become clear how dangerous it is and how it can be used.

upd. 15.01. So, what about this vulnerability in crypt32.dll. Now it has the name NSACrypt (because NSA reported it) and the id CVE-2020-0601. It’s not for all versions of Windows, only for Windows 10, Windows Server 2016 and Windows Server 2019.

An attacker can:

  • sign a malicious executable, making it appear the file was from a trusted, legitimate source -> can be used in phishing attacks
  • conduct man-in-the-middle attacks and decrypt confidential information on user connections to the affected software

There is no a public exploit yet. Tenable made a rumor review and it’s pretty interesting. ?

BTW, in the same Patch Tuesday there were also RCEs in Windows Remote Desktop Gateway (CVE-2020-0609, CVE-2020-0610) Remote Desktop Client (CVE-2020-0611), and Microsoft Excel which might be even more critical. ?

upd. 16.01. So many PoCs of CVE-2020-0601 NSACrypt Curveball were published today. I haven’t tried them (and don’t think I will ?). The funniest demo was this one with mimikatz by Benjamin Delpy. The most promising PoC code seems this one by Kudelski Security.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.