Microsoft Windows SMB Guest Account Local User Access

High Nessus Plugin ID 26919


It is possible to log into the remote host.


The remote host is running one of the Microsoft Windows operating systems or the SAMBA daemon. It was possible to log into it as a guest user using a random account.


In the group policy change the setting for 'Network access: Sharing and security model for local accounts' from 'Guest only - local users authenticate as Guest' to 'Classic - local users authenticate as themselves'. Disable the Guest account if applicable.

If the SAMBA daemon is running, double-check the SAMBA configuration around guest user access and disable guest access if appropriate

Plugin Details

Severity: High

ID: 26919

File Name: smb_guest_account.nasl

Version: $Revision: 1.15 $

Type: remote

Agent: windows

Family: Windows

Published: 2007/10/04

Modified: 2018/02/20

Dependencies: 10394

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

Required KB Items: SMB/guest_enabled

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 1999/01/01

Exploitable With

Metasploit (Microsoft Windows Authenticated Powershell Command Execution)

Reference Information

CVE: CVE-1999-0505

OSVDB: 3106