Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Windows >> SMB Registry : Autologon


Vulnerability Assessment Details

SMB Registry : Autologon

Vulnerability Assessment Summary
Acertains if the autologon feature is installed

Detailed Explanation for this Vulnerability Assessment

Summary :

Anyone can logon to the remote system.

Description :

This script acertains whether the autologon feature is enabled.
This feature permits an intruder to log into the remote host as
DefaultUserName with the password DefaultPassword.

Solution :

Delete the keys AutoAdminLogon and DefaultPassword under
HKLM\SOFTWARE\Microsoft\Window NT\CurrentVersion\Winlogon

See also :

http://www.microsoft.com/windows2000/techinfo/reskit/en-us/regentry/12315.asp

Network Security Threat Level:

High / CVSS Base Score : 7
(AV:L/AC:L/Au:NR/C:C/A:C/I:C/B:N)

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

5X Aluminum Computer Radiator Water Cooling Cooler kit For CPU LED Heatsink OY
$124.18
5X Aluminum Computer Radiator Water Cooling Cooler kit For CPU LED Heatsink OY pictureHP Pavilion 15-b142dx 15.6" OEM CPU Cooling Heatsink 702747-001 4GU33HSTP70 ER*
$8.99
HP Pavilion 15-b142dx 15.61pc 2200rpm CPU Quiet Fan Cooling Heatsink Cooler For Intel LGA775/1155 Durable
$5.54
1pc 2200rpm CPU Quiet Fan Cooling Heatsink Cooler For Intel LGA775/1155 Durable pictureNEW - IBM / AMD Opteron 6134 processor CPU 8 core 2, 3 GHz Base G34 - 69Y4922
$23.31
NEW - IBM / AMD Opteron 6134 processor CPU 8 core 2, 3 GHz Base G34 - 69Y4922 picture


Discussions

No Discussions have been posted on this vulnerability.