Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows : User management >> Local users information : Can't change password


Vulnerability Assessment Details

Local users information : Can't change password

Vulnerability Assessment Summary
Lists the users that have special privileges

Detailed Explanation for this Vulnerability Assessment

Summary :

It is possible to retrieve users who can not change their password
using the supplied credentials.

Description :

Using the supplied credentials it was possible to extract the list of
users who can not change their password.
It is recommended to permit/force users to change their password for
security reasons.

Network Security Threat Level:

Medium / CVSS Base Score : 4
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:C)

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005-2006 Tenable Network Security

Cables, Connectors

HP DL360 G9 6-Core Server 1x E5-2643 v3 3.4GHz 384GB-32 4x 6TB H240ar LFF RPS
$3387.67
HP DL360 G9 6-Core Server 1x E5-2643 v3 3.4GHz 384GB-32 4x 6TB H240ar LFF RPS pictureHP DL360 G9 18-Core Server 1x E5-2699 v3 2.3GHz 256GB-32 4x 2TB SAS P440ar LFF
$3380.52
HP DL360 G9 18-Core Server 1x E5-2699 v3 2.3GHz 256GB-32 4x 2TB SAS P440ar LFF pictureHP DL360 G9 36-Core Server 2x E5-2699 v3 2.3GHz 64GB-16 4x 600GB 15K 12G H240ar
$3986.84
HP DL360 G9 36-Core Server 2x E5-2699 v3 2.3GHz 64GB-16 4x 600GB 15K 12G H240ar pictureHP DL360 G9 24-Core Server 2x E5-2680 v3 2.5GHz 384GB-16 4x 1.2TB SAS P440ar RPS
$3839.55
HP DL360 G9 24-Core Server 2x E5-2680 v3 2.5GHz 384GB-16 4x 1.2TB SAS P440ar RPS picture


Discussions

No Discussions have been posted on this vulnerability.