What is the impact of this change? (apart from satisfying a vulernability scanner)
EnableCertPaddingCheck
Hello,
The WinVerifyTrust Signature Validation CVE-2013-3900 Mitigation (EnableCertPaddingCheck) recently started appearing on my Windows 10 machines.
I've read that the solution is to add the following to the registry
[HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Wintrust\Config]
"EnableCertPaddingCheck"="1"
[HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Cryptography\Wintrust\Config]
"EnableCertPaddingCheck"="1"
My question is, will this create a REG_SZ string value or a DWORD value, and which one should it be?
TIA
Windows Server Security
8 answers
Sort by: Most helpful
-
-
Marc Thornton 20 Reputation points
2023-10-10T11:19:36.1266667+00:00 If a DWORD is required instead of instead of REG_SZ just run following as a *.bat file
@echo off
reg add "HKEY_LOCAL_MACHINE\Software\Microsoft\Cryptography\Wintrust\Config" /v "EnableCertPaddingCheck" /t REG_DWORD /d 1 /f
reg add "HKEY_LOCAL_MACHINE\Software\Wow6432Node\Microsoft\Cryptography\Wintrust\Config" /v "EnableCertPaddingCheck" /t REG_DWORD /d 1 /f
-
Geoff Vass 0 Reputation points
2024-11-15T01:42:57.52+00:00 Microsoft has clarified the value is a REG_DWORD
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2013-3900