A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka βWindows CryptoAPI Spoofing Vulnerabilityβ.
AI Score
Confidence
EPSS
Percentile
99.8%