Opalsec

Opalsec

Share this post

Opalsec
Opalsec
Beware spoofed x.509 Certificates
Tech Talk

Beware spoofed x.509 Certificates

Flaw in Windows CryptoAPI library enables MitM, spoofed signed executables

Opalsec's avatar
Opalsec
Jan 30, 2023
∙ Paid

Share this post

Opalsec
Opalsec
Beware spoofed x.509 Certificates
Share

Researchers from Akamai have released a technical write-up and PoC exploit for CVE-2022-34689, a critical vulnerability in the Windows CryptoAPI library that could enable attackers to spoof legitimate x.509 Certificates, in order to perform authentication or code signing as the spoofed certificate.

This could be abused by attackers to deliver malicious executables that appear to be signed by a legitimate code-signing certificate, or to perform MiTM attacks on encrypted network traffic.

Technical Details

The vulnerability stems from the CreateChainContextFromPathGraph function call in the crypt32.dll module, which validates cached certificates solely based on the value of the certificate’s MD5 thumbprint.

Keep reading with a 7-day free trial

Subscribe to Opalsec to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
© 2025 Opalsec
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share