First published: Thu Dec 16 1999(Updated: )
Windows NT with SYSKEY reuses the keystream that is used for encrypting SAM password hashes, allowing an attacker to crack passwords.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows NT | =4.0 | |
Microsoft Windows NT | =4.0 | |
Microsoft Windows NT | =4.0-sp1 | |
Microsoft Windows NT | =4.0 | |
=4.0 | ||
=4.0 | ||
=4.0 | ||
=4.0-sp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0994 is considered to be of high severity due to the potential for password cracking.
To fix CVE-1999-0994, upgrade to a later version of Windows that does not utilize SYSKEY in this manner.
CVE-1999-0994 affects Windows NT 4.0 and its service packs.
An attacker can exploit CVE-1999-0994 by guessing or cracking weak passwords due to the reused keystream.
A possible workaround for CVE-1999-0994 is to enforce strong password policies to mitigate the risk of password cracking.