Skip to content
By using Twitter’s services you agree to our Cookies Use. We and our partners operate globally and use cookies, including for analytics, personalisation, and ads.
  • Home Home Home, current page.
  • Moments Moments Moments, current page.

Saved searches

  • Remove
  • In this conversation
    Verified accountProtected Tweets @
Suggested users
  • Verified accountProtected Tweets @
  • Verified accountProtected Tweets @
  • Language: English UK
    • Bahasa Indonesia
    • Bahasa Melayu
    • Català
    • Čeština
    • Dansk
    • Deutsch
    • English
    • Español
    • Filipino
    • Français
    • Hrvatski
    • Italiano
    • Magyar
    • Nederlands
    • Norsk
    • Polski
    • Português
    • Română
    • Slovenčina
    • Suomi
    • Svenska
    • Tiếng Việt
    • Türkçe
    • Ελληνικά
    • Български език
    • Русский
    • Српски
    • Українська мова
    • עִבְרִית
    • العربية
    • فارسی
    • मराठी
    • हिन्दी
    • বাংলা
    • ગુજરાતી
    • தமிழ்
    • ಕನ್ನಡ
    • ภาษาไทย
    • 한국어
    • 日本語
    • 简体中文
    • 繁體中文
  • Have an account? Log In
    Have an account?
    · Forgotten your password?

    New to Twitter?
    Sign up
SwiftOnSecurity's profile
SwiftOnSecurity
SwiftOnSecurity
SwiftOnSecurity
@SwiftOnSecurity

Tweets

SwiftOnSecurity

@SwiftOnSecurity

Systems security, author http://DecentSecurity.com , SciFi @ http://UniversalShards.com , sysadmin & F500 SecEng. Microsoft MVP, Client Security 2021. they/them/tay

Cyber, USA
decentsecurity.com
Joined April 2014

Tweets

  • © 2022 Twitter
  • About
  • Help Centre
  • Terms
  • Privacy policy
  • Cookies
  • Ads info
Dismiss
Previous
Next

Go to a person's profile

Saved searches

  • Remove
  • In this conversation
    Verified accountProtected Tweets @
Suggested users
  • Verified accountProtected Tweets @
  • Verified accountProtected Tweets @

Promote this Tweet

Block

  • Tweet with a location

    You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more

    Your lists

    Create a new list


    Under 100 characters, optional

    Privacy

    Copy link to Tweet

    Embed this Tweet

    Embed this Video

    Add this Tweet to your website by copying the code below. Learn more

    Add this video to your website by copying the code below. Learn more

    Hmm, there was a problem reaching the server.

    By embedding Twitter content in your website or app, you are agreeing to the Twitter Developer Agreement and Developer Policy.

    Preview

    Why you're seeing this ad

    Log in to Twitter

    · Forgotten your password?
    Don't have an account? Sign up »

    Sign up for Twitter

    Not on Twitter? Sign up, tune into the things you care about, and get updates as they happen.

    Sign up
    Have an account? Log In »

    Two-way (sending and receiving) short codes:

    Country Code For customers of
    United States 40404 (any)
    Canada 21212 (any)
    United Kingdom 86444 Vodafone, Orange, 3, O2
    Brazil 40404 Nextel, TIM
    Haiti 40404 Digicel, Voila
    Ireland 51210 Vodafone, O2
    India 53000 Bharti Airtel, Videocon, Reliance
    Indonesia 89887 AXIS, 3, Telkomsel, Indosat, XL Axiata
    Italy 4880804 Wind
    3424486444 Vodafone
    » See SMS short codes for other countries

    Confirmation

     

    Welcome home!

    This timeline is where you’ll spend most of your time, getting instant updates about what matters to you.

    Tweets not doing it for you?

    Hover over the profile pic and click the Following button to unfollow any account you're not interested in anymore.

    Say a lot with a little

    When you see a Tweet you love, tap the heart – it lets the person who wrote it know that you appreciate them.

    Spread the word

    The fastest way to share someone else’s Tweet with your followers is with a Retweet. Tap the icon to send it instantly.

    Join the conversation

    Add your thoughts about any Tweet with a Reply. Find a topic you’re passionate about and jump right in.

    Learn the latest

    Get instant insight into what people are talking about right now.

    Get more of what you love

    Follow more accounts to get instant updates about topics you care about.

    Find out what's happening

    See the latest conversations about any topic instantly.

    Never miss a Moment

    Catch up instantly on the best stories happening as they unfold.

    1. SwiftOnSecurity‏ @SwiftOnSecurity 14 Jan 2020

      COMMENTARY ON CVE-2020-0601: I have been speaking to several players on this on background and there are a few things they want to highlight / clarify based on the public discourse so far.

      12 replies . 594 retweets 1,141 likes
      Show this thread
    2. SwiftOnSecurity‏ @SwiftOnSecurity 14 Jan 2020

      When NSA says CVE-2020-0601 enables Remote Code Execution, they mean that trusted communication channels like automatic update downloads and non-validated input between systems could be modified in-transit by a MitM, to cause RCE or other malevolent ends.

      8 replies . 64 retweets 310 likes
      Show this thread
      SwiftOnSecurity‏ @SwiftOnSecurity 14 Jan 2020

      This vulnerability is not about a wormable global takedown of computers, but instead resourced attackers who own network transit points being able to modify communication streams at-will. Basically, nation-state APTs who routinely compromise foreign network infrastructure.

      11:02 am - 14 Jan 2020
      • 75 Retweets
      • 352 Likes
      • Robert Parducci 🎹 ericbalasbas Mayank Varia Nosseb david Łukasz Byjoś - 👨‍💻🇵🇱🇪🇺 Stephen Semmone S.N.
      10 replies . 75 retweets 352 likes
        1. New conversation
        2. SwiftOnSecurity‏ @SwiftOnSecurity 14 Jan 2020

          The gravest impacts of this are established societal and industrial infrastructure. Bank communications. Infrastructure control. Heavy industry. This is a much different threat than is traditionally discussed or news consumers really understand the ramifications of.

          6 replies . 39 retweets 301 likes
          Show this thread
        3. SwiftOnSecurity‏ @SwiftOnSecurity 14 Jan 2020

          Because both TLS communication stream encryption and Authenticode file validation are impacted by this flaw in PKI validation, the normal ways this is guarded against for program updates, are both compromised. There are a few that go beyond this, but it’s exceptionally rare.

          2 replies . 27 retweets 198 likes
          Show this thread
        4. SwiftOnSecurity‏ @SwiftOnSecurity 14 Jan 2020

          This is a fast-checkmate flaw for a hugely resourced and patient global actor like the NSA, but it’s a far greater systemic threat to the United States, which explains why this was properly disclosed to Microsoft.

          7 replies . 43 retweets 265 likes
          Show this thread
        5. SwiftOnSecurity‏ @SwiftOnSecurity 14 Jan 2020

          Innumerable protocols and transactions are protected with x509. Enterprise voice, VPN, really everything these days is being wrapped up in HTTPS and sent over the Internet. And they all rely on Windows’ correct implementation, which is at fault here.

          3 replies . 33 retweets 214 likes
          Show this thread
        6. SwiftOnSecurity‏ @SwiftOnSecurity 14 Jan 2020

          This probably impacts SmartCards / authentication devices that emulate them, too. The US government uses them extensively for access control on secure networks worldwide. @dakami prodded me to mention this.

          6 replies . 20 retweets 157 likes
          Show this thread
        7. SwiftOnSecurity‏ @SwiftOnSecurity 14 Jan 2020

          Note this SmartCard attack scenario is pure speculation and not based on any background info. I’m not sure if it would work since it might be the wrong place in the chain, I’m not sure.

          5 replies . 6 retweets 114 likes
          Show this thread
        8. SwiftOnSecurity‏ @SwiftOnSecurity 14 Jan 2020

          UPDATE: Attacking SmartCard through this flaw is not likely since it leverages elliptic curve, and those cards are very stuck on RSA. In theory it could be in an artisanal environment, not something to really worry about. I’m leaving these tweets up so others speculating can see.

          7 replies . 13 retweets 144 likes
          Show this thread
        9. SwiftOnSecurity‏ @SwiftOnSecurity 14 Jan 2020

          NEW: @tqbf along with several other cryptographers speculate on how CVE-2020-0601 works at a technical level: https://news.ycombinator.com/item?id=22048619 …

          1 reply . 46 retweets 168 likes
          Show this thread
        10. SwiftOnSecurity‏ @SwiftOnSecurity 14 Jan 2020

          ^ @BearSSLnews is the other cryptographer. Update on the SmartCard attack vector: It could work with right scenario, but in practice there aren’t really private roots signing with ECDSA, so there are likely no vulnerable intermediaries. And smartcards are pinned to a private root

          2 replies . 7 retweets 93 likes
          Show this thread
        11. SwiftOnSecurity‏ @SwiftOnSecurity 14 Jan 2020

          SwiftOnSecurity Retweeted Amitai Rottem

          Microsoft have built extensive alerting for CVE-2020-0601 which will definitely complicate exploitation, since there’s few in a network position to interdict your traffic, except governments. Yes I know about WiFi/Responder that’s not the main problem here https://twitter.com/amitaitechie/status/1217156973268893696?s=21 …https://twitter.com/AmitaiTechie/status/1217156973268893696 …

          SwiftOnSecurity added,

          Amitai Rottem @AmitaiTechie
          Windows Defender Antivirus detects files w/crafted certificates exploiting the certificate validation vulnerability: ​Exploit:Win32/CVE-2020-0601.A (PE files) Exploit:Win32/CVE-2020-0601.B (Scripts) Also, #Microsoft Defender ATP has a threat report on your posture. #CVE-2020-0601 pic.twitter.com/dFqJV5za8F
          3 replies . 28 retweets 119 likes
          Show this thread
        12. SwiftOnSecurity‏ @SwiftOnSecurity 14 Jan 2020

          SwiftOnSecurity Retweeted Kevin Beaumont

          After FLAME abused a Microsoft certificate for malware, MSFT added large numbers of hardening solutions to WinUpdate, even for significant security break scenarios. It appears because of this, Windows Update itself is not vulnerable to CVE-2020-0601.https://twitter.com/gossithedog/status/1217242998418935809 …

          SwiftOnSecurity added,

          Kevin BeaumontVerified account @GossiTheDog
          Replying to @mattwwaters @SwiftOnSecurity and 5 others
          No, even if you spoof signed with ECC, it validates dual RSA signing (which you can’t spoof).
          1 reply . 64 retweets 203 likes
          Show this thread
        13. SwiftOnSecurity‏ @SwiftOnSecurity 15 Jan 2020

          SwiftOnSecurity Retweeted  ✨saleem ✨

          This appears to show a private exploit for CVE-2020-0601 has now been developed. Saleem is a trusted researcher.https://twitter.com/saleemrash1d/status/1217495681230954506 …

          SwiftOnSecurity added,

           ✨saleem ✨ @saleemrash1d
          CVE-2020-0601 pic.twitter.com/8tJsJqvnHj
          Show this thread
          4 replies . 68 retweets 146 likes
          Show this thread
        14. SwiftOnSecurity‏ @SwiftOnSecurity 15 Jan 2020

          SwiftOnSecurity Retweeted  ✨saleem ✨

          Update: Chrome has also fallen to CVE-2020-0601 after a few extra constraints it imposes were met. It’s not a web browsers fault or responsibility to defeat an OS-level problem, it’s a flaw in the most basic tenets of Windows’ PKI validation.https://twitter.com/saleemrash1d/status/1217519809732259840 …

          SwiftOnSecurity added,

           ✨saleem ✨ @saleemrash1d
          thanks to @CiPHPerCoder's hint :) the biggest constraints are Chrome's tight certificate policies and that the root CA must be cached, which you can trigger by visiting a legitimate site that uses the certificate pic.twitter.com/GgftwVvpY8
          Show this thread
          3 replies . 35 retweets 83 likes
          Show this thread
        15. SwiftOnSecurity‏ @SwiftOnSecurity 15 Jan 2020

          Sidenote: Intermediate CA certificate chaining and caching is an interesting problem that can happen in TLS. If you can’t figure out a validation problem, this may be the root cause. And it’s often overlooked since it “works on the developer’s machine” due to their own habits.

          1 reply . 4 retweets 42 likes
          Show this thread
        16. SwiftOnSecurity‏ @SwiftOnSecurity 15 Jan 2020

          Update: - Chrome’s next version (Beta pending release) will detect CVE-2020-0601. - The New Edge browser Microsoft released today also defeats it. It’s not their responsibility to do this, but it is cool to go the extra mile. I don’t have a contact in Firefox about their plans.

          6 replies . 20 retweets 94 likes
          Show this thread
        17. SwiftOnSecurity‏ @SwiftOnSecurity 15 Jan 2020

          I don’t have public documentation to prove this, you’re going to have to contact a security researcher who has an exploit and ask them to test my information.

          1 reply . 3 retweets 27 likes
          Show this thread
        18. SwiftOnSecurity‏ @SwiftOnSecurity 15 Jan 2020

          SwiftOnSecurity Retweeted  ✨saleem ✨

          Ah interesting! Firefox unaffected, makes sense, doh. Although Firefox has adopted parts of the Windows PKI engine for enterprise compatibility, they’re still based on their-in house NSS engine. My oversight. Thanks @saleemrash1d, follow them for more infohttps://twitter.com/saleemrash1d/status/1217533569213640705 …

          SwiftOnSecurity added,

           ✨saleem ✨ @saleemrash1d
          Replying to @SwiftOnSecurity
          AFAIK Firefox is performing all the certificate validation in-house in NSS so it is unaffected — but i haven't done the legwork to fully verify this. what i can say is that Firefox is completely refusing to parse the certificates, not even just treating them as untrustworthy.
          3 replies . 28 retweets 117 likes
          Show this thread
        19. SwiftOnSecurity‏ @SwiftOnSecurity 15 Jan 2020

          Mozilla through their NSS engine and trusted certificate store program are a critical part of the global PKI system, we’re lucky to have their diversity of implementation. A very under-appreciated fact outside of small circles.

          4 replies . 59 retweets 263 likes
          Show this thread
        20. SwiftOnSecurity‏ @SwiftOnSecurity 16 Jan 2020

          SwiftOnSecurity Retweeted Kenn White

          Well there we go, a public break released, after a couple of private examples provided yesterday. NSA obviously understood perfectly how fast this would happen. I did not properly gauge how that factored into their urgency.https://twitter.com/kennwhite/status/1217816643725930498 …

          SwiftOnSecurity added,

          Kenn WhiteVerified account @kennwhite
          And there it is: Public PoC released for 2020-0601. With ~50 lines of Python “we [are able to] sign a certificate with arbitrary domain name and subject alternative names.” Great work @AnomalRoil & @Pelissier_S! (And thanks for the shoutout 👍) https://twitter.com/AnomalRoil/status/1217723197992423426 …
          3 replies . 25 retweets 56 likes
          Show this thread
        21. End of conversation

      Loading seems to be taking a while.

      Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

        Promoted Tweet

        false

        • © 2022 Twitter
        • About
        • Help Centre
        • Terms
        • Privacy policy
        • Cookies
        • Ads info