PatchSiren cyber security CVE debrief
CVE-2013-3900 Microsoft CVE debrief
CVE-2013-3900 is a Microsoft WinVerifyTrust function remote code execution vulnerability that CISA lists in its Known Exploited Vulnerabilities catalog. Because CISA marks it as known exploited, organizations should treat remediation as urgent and follow Microsoft’s update guidance without delay.
- Vendor
- Microsoft
- Product
- WinVerifyTrust function
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2022-01-10
- Original CVE updated
- 2022-01-10
- Advisory published
- 2022-01-10
- Advisory updated
- 2022-01-10
Who should care
Windows administrators, patch management teams, endpoint security teams, and defenders responsible for Microsoft-managed systems should prioritize this issue, especially where trust-validation or code-signing workflows are used.
Technical summary
The supplied sources identify the issue as a remote code execution flaw in Microsoft’s WinVerifyTrust function. CISA’s KEV catalog records it as known exploited and directs organizations to apply updates per vendor instructions. The provided corpus does not include further technical detail such as a root cause, attack vector, or affected version list, so this summary is limited to the confirmed classification and remediation guidance.
Defensive priority
High. CISA KEV inclusion indicates known exploitation, so this vulnerability should be prioritized ahead of routine patch cycles and validated across all relevant Microsoft endpoints and servers.
Recommended defensive actions
- Apply Microsoft updates per vendor instructions for all systems that include the affected component.
- Confirm remediation across desktops, servers, and remotely managed assets rather than only a single representative system.
- Prioritize high-value and externally exposed assets first when scheduling fixes.
- Verify patch installation and monitor for unusual code-execution or trust-validation activity after remediation.
Evidence notes
CISA’s Known Exploited Vulnerabilities feed identifies vendorProject Microsoft, product WinVerifyTrust function, vulnerabilityName Microsoft WinVerifyTrust function Remote Code Execution, dateAdded 2022-01-10, dueDate 2022-07-10, and requiredAction Apply updates per vendor instructions. The CVE.org and NVD links in the supplied corpus provide the canonical record and vulnerability detail references. The corpus does not provide CVSS, exploit mechanics, or affected-version scope.
Official resources
-
CVE-2013-3900 CVE record
CVE.org
-
CVE-2013-3900 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply updates per vendor instructions.
-
Source item URL
cisa_kev
This debrief is based only on the supplied CVE metadata and official reference links. The provided timeline lists 2022-01-10 as the published/modified date and KEV date added; this is treated as source metadata and not as the original issue