Share via

CVE-2013-3900 WinVerifyTrust Signature Validation Vulnerability

Abdul Aremu 5 Reputation points
2024-08-07T10:30:44.23+00:00

Hi All

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2013-3900

To remediate the vulnerability CVE-2013-3900 is to add the below registry values.

[HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Wintrust\Config] "EnableCertPaddingCheck"="1"

[HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Cryptography\Wintrust\Config] "EnableCertPaddingCheck"="1"

On my Windows servers 10 i dont see the folders Wintrust\Config in registries. And when i do as said in the link, which is to put the command in a .reg file and double click it. I get the error as seen in the image attached

WinVerify

Windows for business | Windows Client for IT Pros | User experience | Other

3 answers

Sort by: Most helpful
  1. Albion Cela 0 Reputation points
    2024-10-22T11:35:16.21+00:00

    Hi , i already checked and the value under the specific directory is "1" but on scanning my machine is still showing as vulnerable.

    Thank you

    Was this answer helpful?

    0 comments No comments

  2. Guillaume Genest 0 Reputation points
    2024-09-13T18:42:47.14+00:00

    Is CVE-2013-3900 really affecting windows 10/ windows 11? Do we really need to create that registry key to fix a 2013 cve?

    Please advise.

    Was this answer helpful?

    0 comments No comments

  3. Anonymous
    2024-08-08T03:22:45.4366667+00:00

    Hello.

    Open the .reg file using Notepad. To do this: Right-click on the .reg file and choose ‘Edit’.

    Remove the blank line at the top of the file.

    Cannot import file: The specified file is not a registry script (thewindowsclub.com)

    Best Regards,

    Hania Lian

    ============================================

    If the Answer is helpful, please click "Accept Answer" and upvote it.

    Was this answer helpful?


Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.