WinVerifyTrust Signature Validation Mitigation (CVE-2013-3900)

Поділитися
Вставка
  • Опубліковано 26 вер 2024

КОМЕНТАРІ • 44

  • @NNAdmin
    @NNAdmin  Рік тому

    This video goes over the vulnerability and how to fix it.
    Please Like and Subscribe by clicking here: studio.ua-cam.com/channels/39GKRsNps38x7UzydcOZ9w.html
    Follow me on Twitter: twitter.com/NielsenNTWKING

  • @quank32
    @quank32 2 місяці тому

    Thank you for posting this. This just popped up on my vulnerability scanner for some older devices and your video validated what I have been reading

    • @NNAdmin
      @NNAdmin  2 місяці тому

      Glad it helped

  • @miguelarceo6020
    @miguelarceo6020 7 місяців тому +1

    I searched into many webpages and nothing like this video, thanks a lot.

    • @NNAdmin
      @NNAdmin  7 місяців тому

      Welcome 👍

  • @nicolasjochem1814
    @nicolasjochem1814 10 місяців тому +1

    Hey Nielsen, great to have helpful videos like that, well done :)
    Another person asked this as well: What can go wrong?
    One thing for me would "already" be that the servers need a restart (not that it's not possible, just that it has to be scheduled right).
    Did you hear about any complains that the cert padding check breaks things?

    • @NNAdmin
      @NNAdmin  10 місяців тому +1

      I have implemented these changes on numerous servers and never had an issue. *knocks on wood*. Yes, you would want to reboot during a planned maintenance.

    • @nicolasjochem1814
      @nicolasjochem1814 10 місяців тому

      ​@@NNAdmin Great News Nielsen, Thank you for the quick reply! :)
      * Knocking on wood * there as well, if something goes wrong against all odds, I will try to remember to leave another comment here :D

  • @-electrochapati-5501
    @-electrochapati-5501 6 місяців тому +1

    ur the goat man 🙏

  • @milkahmburu3329
    @milkahmburu3329 Рік тому

    Great Stuff Nielsen.Thanks

    • @NNAdmin
      @NNAdmin  Рік тому

      Glad you enjoyed it

  • @cayonarciso1460
    @cayonarciso1460 Рік тому +1

    Awesome, thank you.

  • @nrc6892
    @nrc6892 Рік тому

    Awesome stuff, thank you!

    • @NNAdmin
      @NNAdmin  Рік тому

      Glad you liked it!

  • @adamgnz1786
    @adamgnz1786 4 місяці тому

    Very Helpful!!

  • @SKumar-vLog
    @SKumar-vLog 5 місяців тому

    Windows kerberos RC4-HMAC elevation of privilege vulnerability.
    CVE-2022-37966
    Windows server 2019 ..
    Remediation:- Update windows server 2019 to version 10.0.17763.3650
    Can you plz let me know the steps to fix this vulnerability.

    • @NNAdmin
      @NNAdmin  5 місяців тому +1

      I believe there is a MS patch for this?

  • @SKumar-vLog
    @SKumar-vLog 5 місяців тому

    I am trying to fix this but its not working. Can you plz help me ..
    I am from India.

    • @NNAdmin
      @NNAdmin  5 місяців тому

      I replied below.

  • @pahadirahi
    @pahadirahi 10 місяців тому

    Hi Nielsen, Thanks for the video its really helpful, just need to ask what if we have multiple servers like more than 100?

    • @NNAdmin
      @NNAdmin  10 місяців тому +1

      Thanks for the nice comments, you would need push out the registry keys via GPO, Intune or some other desktop management software.

    • @pahadirahi
      @pahadirahi 10 місяців тому

      @@NNAdmin got it thanks 🙂

  • @shahzadharoon497
    @shahzadharoon497 11 місяців тому +1

    This one for which purpose and where is effected

    • @NNAdmin
      @NNAdmin  11 місяців тому

      I am not certain what you mean? But it's for CVE-2013-3900 and it affects certain hardware/software.

  • @vicskorpio
    @vicskorpio Рік тому

    Thank you. One question. For a windows Server, need restara? or not necesary?

    • @NNAdmin
      @NNAdmin  Рік тому

      Yes, for the changes to be active.

  • @SKumar-vLog
    @SKumar-vLog 5 місяців тому

    I created that text file and pest that registery key setting, saving text file with name of - wintrust.reg , but this file icon not changing, its simply showing as a text file .. and when i am right click on that file , i dont find out that Merge option..
    Can you plz help me .

    • @NNAdmin
      @NNAdmin  5 місяців тому

      Sounds like it's still a text file. Can you enable showing file extension?
      Windows 10:
      Open File Explorer; if you do not have an icon for this in the task bar; click Start, click Windows System, and then File Explorer.
      Click the View tab in File Explorer.
      Click the box next to File name extensions to see file extensions.
      Click the box next to Hidden items to see hidden files.
      Then see if the file has a .reg extension?

    • @SKumar-vLog
      @SKumar-vLog 5 місяців тому

      ​@@NNAdmin... I want to know this ... I m the only person in my project ... I need help ..

  • @SKumar-vLog
    @SKumar-vLog 5 місяців тому

    Microsoft odbc driver remote code execution vulnerability.
    CVE-2024-21440
    Can you plz let me know how to fix this vulnerability. ?

    • @NNAdmin
      @NNAdmin  5 місяців тому +1

      I believe there is a MS patch for this?

    • @SKumar-vLog
      @SKumar-vLog 5 місяців тому

      Can you plz tell exact patch KB details.

  • @tnq22
    @tnq22 Рік тому

    Thank you very nhiều :D

  • @jahedbenbarka9008
    @jahedbenbarka9008 Рік тому

    Thank you my friend 😉

  • @user-kt6fp8me6h
    @user-kt6fp8me6h 10 місяців тому

    I have a question on this. We received a vulnerability report at my company for one server that has this issue but ALL of our serves across our environments do not have the wintrust reg path - is this worth even doing? Our servers run server 2016 datacenter.

    • @NNAdmin
      @NNAdmin  10 місяців тому

      Yes, I would think you would want to create the path and add the key. That said, if your goal is to stay off the report, and you're not showing on the report, then maybe you don't, but that would be your call.

  • @josefranciscomendoza8009
    @josefranciscomendoza8009 Рік тому

    Hi Good afternoon I followed the steps and apply your recomendations. One doubt ? I rebooted the server after this recomendattions. after the reboot i must run the "How to disable the functionality. Perform the following to delete the registry value previously added" , or is not necessary. regards.

    • @NNAdmin
      @NNAdmin  Рік тому

      No need to delete any registry keys.

  • @TheAkloy
    @TheAkloy Рік тому +1

    Is there any effect on OS functionality on production while applied this on regedit?

    • @NNAdmin
      @NNAdmin  Рік тому

      Not that I am aware, but check this article out for more specifics on authenticode.
      learn.microsoft.com/en-us/security-updates/securityadvisories/2014/2915720