Microsoft Windows SMB Registry : Winlogon Key Permission Weakness

High Nessus Plugin ID 10429


Local users can gain SYSTEM privileges.


The registry key HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon is writeable by users who are not in the admin group.

This key contains a value which defines which program should be run when a user logs on.

As this program runs in the SYSTEM context, the users who have the right to change the value of this key can gain more privileges on this host.


Use regedt32 and set the permissions of this key to :

- admin group : Full Control
- system : Full Control
- everyone : Read

Plugin Details

Severity: High

ID: 10429

File Name: smb_reg_winlogon_permissions.nasl

Version: $Revision: 1.31 $

Type: local

Agent: windows

Family: Windows

Published: 2000/05/29

Modified: 2015/12/15

Dependencies: 10400, 10150, 10394

Risk Information

Risk Factor: High


Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

Required KB Items: SMB/transport, SMB/name, SMB/login, SMB/password, SMB/registry_access

Reference Information

CVE: CVE-1999-0589

BID: 182

OSVDB: 332