CVE-2020-0601 - How to operationalize the handling of vulnerabilities in your SOC

Hey there,

Software vulnerabilities are part of our lives in a digitalized world. If anything is certain, it’s that we will continue to see vulnerabilities in software code! Recently the CVE-2020-0601 vulnerability, also known as CurveBall or “Windows CryptoAPI Spoofing Vulnerability”, was discovered, reported by the NSA and made headlines. The NSA even shared a Cybersecurity Advisory on the topic. Anthony previously talked about it from a public sector and Vulnerability Scanner angle. I wanted to take this opportunity to look at it from a security operations perspective, particularly with regard to the two proof of concept exploits which were published last week.

Computerworld article

Source: Computerworld

Every security operations team that reads the news should have a process to work systematically on these issues. For this reason, I thought I’d put together possible questions that can be raised during such an exercise and how those can be addressed with the CVE-2020-0601 vulnerability.

What is the CVE-2020-0601 vulnerability?

If vulnerabilities are disclosed they get a CVE number and are documented in the National Vulnerability Database from MITRE. So CVE-2020-0601 got an entry with a technical description. Basically, the Windows CryptoAPI which validates the signatures of certificates is not working correctly. The CryptoAPI is missing the validation of one parameter which unfortunately leaves a gap.

What is the possible impact if it’s exploited?

Cyber attackers can create certificates under the name of legitimate owners which are then mistakenly recognized as trusted by systems that are vulnerable. These certificates can be used to create trusted https connections, trusted signed files and emails as well as signed binaries of applications where system administrators may have restricted application use and are available to trusted or specific developers and vendors only.

As Proof of Concepts (POCs) were published this week, it’s become part of every cyber attacker’s repertoire.

Am I affected by the vulnerability in my environment?

Microsoft has released a security advisory and lists most of Windows 10, Windows Server 2016 and Windows Server 2019. It is likely that your organization is affected in some way.

What mitigation options are available?

When software vulnerabilities are responsibly disclosed, a mitigation or workaround option is made available to ensure that millions of systems are not left vulnerable over a longer period of time. Microsoft released its Patch Tuesday security updates to apply.

How can I identify if the exploits are actively used in my environment?

Once the Microsoft security patch has been installed, the Windows host will detect if a manipulated certificate made the attempt to be validated. It will also write a log in the Windows application event log with the Event ID 1 - Audit-CVE and the description that it is a possible detection of CVE-2020-0601 certification validation. While the Microsoft Advisory states that “..the system will generate Event ID 1 in the Event Viewer after each reboot”, the events turned up immediately during my test without any kind of reboot.

CVETest Page from Kudelski Security

Test via the CVETest Page from Kudelski Security

You can easily collect these with the Splunk universal forwarder. If you want to know how to filter to collect only that specific Windows event Log - check out this twitter conversation.

CVE-2020-0601 audit log file

When rolled out, the Microsoft security patch for CVE-2020-0601 indicates that the vulnerability has been actively deployed in your environment. The hits should be configured now to trigger alerts within your Splunk or Splunk Enterprise Security instance.

What can I do if I see an exploit hit my environment?

Let’s assume that a cyber attacker successfully managed to get a malicious file that was digitally signed with a spoofed certificate executed on your endpoint and this triggered after the patch installation of the Audit-CVE event. The Audit-CVE event holds the information about the execution process id (PID) which through sysmon process monitoring or your favourite endpoint protection tool can be tied back to the corresponding file or process.

Such a playbook can look within Splunk Phantom like that: Playbook in Splunk Phantom

In this Playbook we will examine the scenario of a malicious file being deployed in the compromised system:

Can I perform a forensic investigation if it was exploited in the past?

In most cases of security announcements it is possible to look back as the activity can be identified through machine data. Check out the SWIFT Banking attack for reference. In this case, prior to patch deployment it’s difficult to detect if this vulnerability was exploited. The research paper from SecterOps.Io gives insights into how the certificate validation and potential attack vectors can work. For defenders they recommend for example to monitor several registry keys, if they have been accessed or changed. Also, they suggest collecting from the windows event log and the Microsoft-Windows-CodeIntegrity/Operational logs in case you want to deep dive to enhance your proactive monitoring capabilities.

Screenshot log overview

Screenshot logfiles sourcetype

Windows Event Collection from Microsoft-Windows-CodeIntegrity/Operational

Hopefully, this example helps you to plan your security operations processes accordingly. That way you’ll be prepared when you look out for CVE-2020-0601 exploitation indicators or when the next vulnerability hits the news.

Best

Matthias

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.