PatchSiren

PatchSiren cyber security CVE debrief

CVE-2013-3900 Microsoft CVE debrief

CVE-2013-3900 is a Microsoft WinVerifyTrust function remote code execution vulnerability that CISA lists in its Known Exploited Vulnerabilities catalog. Because CISA marks it as known exploited, organizations should treat remediation as urgent and follow Microsoft’s update guidance without delay.

Vendor
Microsoft
Product
WinVerifyTrust function
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2022-01-10
Original CVE updated
2022-01-10
Advisory published
2022-01-10
Advisory updated
2022-01-10

Who should care

Windows administrators, patch management teams, endpoint security teams, and defenders responsible for Microsoft-managed systems should prioritize this issue, especially where trust-validation or code-signing workflows are used.

Technical summary

The supplied sources identify the issue as a remote code execution flaw in Microsoft’s WinVerifyTrust function. CISA’s KEV catalog records it as known exploited and directs organizations to apply updates per vendor instructions. The provided corpus does not include further technical detail such as a root cause, attack vector, or affected version list, so this summary is limited to the confirmed classification and remediation guidance.

Defensive priority

High. CISA KEV inclusion indicates known exploitation, so this vulnerability should be prioritized ahead of routine patch cycles and validated across all relevant Microsoft endpoints and servers.

Recommended defensive actions

  • Apply Microsoft updates per vendor instructions for all systems that include the affected component.
  • Confirm remediation across desktops, servers, and remotely managed assets rather than only a single representative system.
  • Prioritize high-value and externally exposed assets first when scheduling fixes.
  • Verify patch installation and monitor for unusual code-execution or trust-validation activity after remediation.

Evidence notes

CISA’s Known Exploited Vulnerabilities feed identifies vendorProject Microsoft, product WinVerifyTrust function, vulnerabilityName Microsoft WinVerifyTrust function Remote Code Execution, dateAdded 2022-01-10, dueDate 2022-07-10, and requiredAction Apply updates per vendor instructions. The CVE.org and NVD links in the supplied corpus provide the canonical record and vulnerability detail references. The corpus does not provide CVSS, exploit mechanics, or affected-version scope.

Official resources

This debrief is based only on the supplied CVE metadata and official reference links. The provided timeline lists 2022-01-10 as the published/modified date and KEV date added; this is treated as source metadata and not as the original issue