Skip to main content

CVE-2013-3900 WinVerifyTrust Signature Vulnerability 

Purpose

This solution contains the template for the CVE-2013-3900 remediation and auditing of the agents.

Associated Content

ContentTypeFunction
Script - CVE-2013-3900 WinVerifyTrust Signature VulnerabilityScriptThis script was created to run the detection and remediation for the CVE-2013-3900 WinVerifyTrust Signature Vulnerability based on the EDFs option selected on the agent.
Script - CVE-2013-3900 Ticketing - Per ClientClient ScriptThis client script creates a ticket for each client with the computer count where remediation is required.
Remote Monitor - CVE-2013-3900 WinVerifyTrust Signature ValidationRemote MonitorThis remote monitor is designed to check whether the agent is vulnerable to the CVE-2013-3900 reported by Microsoft.
Dataview - CVE-2013-3900 WinVerifyTrust Signature AuditDataviewThis dataview gathers data from the script CWA Script - CVE-2013-3900 WinVerifyTrust Signature Vulnerability and depicts the status of CVE-2013-3900 on the agent where it is deployed.
△ Custom - Execute Script - CVE-2013-3900 WinVerifyTrust Signature VulnerabilityAlert TemplateThis alert template is designed to apply to the Remote Monitor - CVE-2013-3900 WinVerifyTrust Signature Validation to schedule the autofix Script - CVE-2013-3900 WinVerifyTrust Signature Vulnerability to perform detection or remediation based on the EDF selection and store the data in the EDFs for auditing.

Implementation

  1. Import the following content using the ProSync Plugin:

    Import the Remote Monitor following the document below:

    • Import - Remote Monitor - CVE-2013-3900 WinVerifyTrust Signature Validation
  2. Reload the system cache.

  3. Configure the solution as outlined below:

    • Navigate to Browse -> Groups -> Computers -> Monitors within the CWA Control Center and set the following:
      • Remote Monitor - CVE-2013-3900 WinVerifyTrust Signature Validation
        • Setup with △ Custom - Execute Script - CVE-2013-3900 WinVerifyTrust Signature Vulnerability and click update.