trying making sure the 1 is a DWORD and not REG_SZ
EnableCertPaddingCheck
Hello,
The WinVerifyTrust Signature Validation CVE-2013-3900 Mitigation (EnableCertPaddingCheck) recently started appearing on my Windows 10 machines.
I've read that the solution is to add the following to the registry
[HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Wintrust\Config]
"EnableCertPaddingCheck"="1"
[HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Cryptography\Wintrust\Config]
"EnableCertPaddingCheck"="1"
My question is, will this create a REG_SZ string value or a DWORD value, and which one should it be?
TIA
Windows for business | Windows Server | Devices and deployment | Configure application groups
9 answers
Sort by: Most helpful
-
Areiza, Juan C. (NSSC-NCCIPS)[SAIC] 10 Reputation points
2023-04-18T19:08:16.5833333+00:00 -
jandec 11 Reputation points
2022-11-08T06:48:02.443+00:00 Hi,
When following the instructions and creating the .reg files as published in https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2013-3900, the registry keys are created as REG_SZ.HTH
-
Mike Huf 6 Reputation points
2025-03-21T14:26:04.29+00:00 For anyone stumbling across this article:
Consider instead applying this via GPO after you import the MS Security Guide admx template. It's the "enable certificate padding" policy in that admx.
-
Matt D. Sardi 45 Reputation points
2023-03-24T12:41:41.0933333+00:00 These registry keys will not remediate this issue. I have another request open for Microsoft to provided an updated and correct solution.
-
Machado, Claudemar (contracted) 0 Reputation points
2023-01-17T19:16:51.5733333+00:00 Hi, once I have created as REG_SZ, should I use content number 1 or the word "enable". ?