Vulnerability Name: | CCN-4608 | ||||||
Published: | 2000-06-05 | ||||||
Updated: | 2000-06-05 | ||||||
Summary: | Windows NT 4.0 could allow an attacker to decrypt data sent by an administrator after a new computer account is added to the domain. When an administrator adds a computer to the domain, the computer name and password is transmitted over the network. The computer name is sent in plaintext, and the password is encrypted, although the password defaults to the computer name if none is specified. A local user can use this to obtain the User Session Key, and then decrypt data sent by the administrator, including password changes. | ||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||
CVSS v2 Severity: | 4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||
Vulnerability Consequences: | Gain Access | ||||||
References: | Source: CCN Type: BugTraq Mailing List, Sun Jun 04 2000 - 15:33:36 CDT NT admin password change algorithms expose user plaintext passwords Source: XF Type: UNKNOWN nt-account-creation(4608) | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |