Registry access allowed for all users |
---|
Risk Level: | Medium | Check or Attack Name: winreg - everyone |
---|---|---|
Platforms: | Windows NT | |
Description: | Unrestricted remote access for all users to the registry has been successful. The HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurePipeServers\winreg key permissions are set to allow access to all users via a null session. If this key is not present, remote access to the registry is not controlled. If this key is detected and Windows NT 4.0 Service Pack 3 or later has not been applied, then non-authenticated users can write registry keys. If the Everyone group is denied access, null session access to the registry can be prevented. |
|
Remedy: | Apply the latest Windows NT 4.0 Service Pack and modify the registry for RestrictAnonymous. To apply the latest Windows NT 4.0 Service Pack, follow these steps:
—AND— To restrict registry access, follow these steps:
If an Allowed Paths subkey is present under the winreg key, inspect permissions on these paths closely. This optional subkey defines specific paths into the registry that are allowed access, regardless of the security on the winreg registry key. It contains multiple strings representing registry entries that can be read by Everyone. This subkey allows specific system functions, such as checking printer status, to work correctly regardless of how access is restricted via the winreg registry key. The default security on the AllowedPaths registry key only grants Administrators the ability to manage these paths. |
|
References: | Microsoft Knowledge Base Article Q155363, HOWTO: Regulate Network Access to the Windows NT Registry, http://support.microsoft.com/support/kb/articles/q155/3/63.asp |
Know Your Risks |