A 10-year-old Windows vulnerability is still being made use of in attacks to make it appear that executables are legally signed, with the repair from Microsoft still “opt-in” after all these years. Even even worse, the repair is gotten rid of after updating to Windows 11.
On Wednesday night, news broke that VoIP interactions business 3CX was jeopardized to disperse trojanized variations of its Windows desktop application in a massive supply chain attack.
As part of this supply chain attack, 2 DLLs utilized by the Windows desktop application were changed with harmful variations that download extra malware to computer systems, such as an information-stealing trojan.
Among the harmful DLLs utilized in the attack is typically a genuine DLL signed by Microsoft called d3dcompiler_47. dll. Nevertheless, the risk stars customized the DLL to consist of an encrypted harmful payload at the end of the file.
As very first kept in mind the other day, despite the fact that the file was customized, Windows still revealed it as properly signed by Microsoft.

Source: BleepingComputer
Code signing an executable, such as a DLL or EXE file, is suggested to ensure Windows users that the file is genuine and has actually not been customized to consist of harmful code.
When a signed executable is customized, Windows will show a message specifying that the “digital signature of the item did not confirm.” Nevertheless, despite the fact that we understand that the d3dcompiler_47. dll DLL was customized, it still revealed as checked in Windows.
After getting in touch with Will Dormann, a senior vulnerability expert at ANALYGENCE, about this habits and sharing the DLL, we were informed that the DLL is making use of the CVE-2013-3900 defect, a “WinVerifyTrust Signature Recognition Vulnerability.”
Microsoft initially revealed this vulnerability on December 10th, 2013, and described that including material to an EXE’s authenticode signature area (WIN_CERTIFICATE structure) in a signed executable is possible without revoking the signature.
For instance, Dormann described in tweets that the Google Chrome installer includes information to the Authenticode structure to identify if you chose into “sending out use data and crash reports to Google.” When Google Chrome is set up, it will inspect the authenticode signature for this information to identify if diagnostic reports ought to be allowed.
Microsoft eventually chose to make the repair optional, most likely since it would revoke genuine, signed executables that kept information in the signature block of an executable.
” On December 10, 2013, Microsoft launched an upgrade for all supported releases of Microsoft Windows that alters how signatures are validated for binaries signed with the Windows Authenticode signature format,” discusses Microsoft’s disclosure for the CVE-2013-3900.
” This modification can be allowed on an opt-in basis.”
” When allowed, the brand-new habits for Windows Authenticode signature confirmation will no longer enable extraneous details in the WIN_CERTIFICATE structure, and Windows will no longer acknowledge non-compliant binaries as signed.”
It is now near to 10 years later on, with the vulnerability understood to be made use of by many risk stars. Yet, it stays an opt-in repair that can just be allowed by manually modifying the Windows Computer registry.
To allow the repair, Windows users on 64-bit systems can make the following Computer registry modifications:
Windows Computer Registry Editor Variation 5.00
[HKEY_LOCAL_MACHINESoftwareMicrosoftCryptographyWintrustConfig]
” EnableCertPaddingCheck”=” 1″
[HKEY_LOCAL_MACHINESoftwareWow6432NodeMicrosoftCryptographyWintrustConfig]
” EnableCertPaddingCheck”=” 1″
As soon as these Computer registry secrets are allowed, you can see how in a different way Microsoft verifies the signature in the harmful d3dcompiler_47. dll DLL utilized in the 3CX supply chain attack.
![]() |
![]() |
To make matters worse, even if you include the Computer registry secrets to use the repair, they will be gotten rid of as soon as you update to Windows 11, making your gadget susceptible once again.
As the vulnerability has actually been utilized in current attacks, such as the 3CX supply chain and a Zloader malware circulation project in January, it has actually ended up being clear that it ought to be repaired, even if that hassles designers.
Regrettably, a lot of do not learn about this defect and will take a look at a destructive file and presume it’s credible as Windows reports it as being so.
” However when a repair is optional, the masses aren’t going to be secured,” cautioned Dormann.
I allowed the optional repair, utilized the computer system as normal throughout the day, and did not encounter any problems that made me regret my choice.
While this might trigger a concern with some installers, like Google Chrome, disappointing as signed, the included security deserves the trouble.
BleepingComputer connected to Microsoft about the ongoing abuse of this defect and it just being an opt-in repair however has actually not gotten a reply.