Korean
<< Back
VID 27003
Severity 40
Port 139
Protocol TCP
Class SMB
Detailed Description A Local Administrator account with no password exists, and it's possible to log into the system with the account.

local account is given logon privileges to a local host and access privileges to the resources in local host which was created . It's needed other account for access to the resources of other hosts. This account information is stored in the SAM(Security Accounts Manager) on the local host. Account management and password management is important in preventing unauthorized access to your system. If Administrator account with no password exists, attackers can log on the system with account easily. And they may access sensitive information as the files, the printer and system resources as the user/group account, security policy with the administrator privileges. You should make sure that only the proper users are member of this Administrator group.
This check attempts to log on using null password remotely for only local accounts that are part of the Administrator group, and displays the name of the accounts that logged on successfully.

* References:
http://www.iss.net/security_center/static/160.php
Recommendation Disable this account if it is not needed or change password to be difficult to guess.

To disable the account

For a Windows NT:
1. Open User Manager.
2. Select the user from the list.
3. Select 'Properties' entry from the User menu.
4. Check the "Account Disabled" check box.

For a Windows 2000 domain:
1. Start Active Directory Users and Computers Management Console (dsa.msc).
2. Look for the user in the domain.
3. Select the 'Properties' entry for the user.
4. Select the 'Account' Tab.
5. Check the "Account is disabled" check box.

For stand-alone Windows 2000 machines:
1. Start Local Users and Groups Management Console (lusrmgr.msc).
2. Open the User folder and select the User.
4. Select the 'Properties' menu for the user.
5. Select the 'General' Tab.
6. Check the "Account is disabled" check box.

For Windows XP, 2003, VISTA, 7, 2008, 8, 2012, 10, 2016, 2019:
1. Start menu, select Run and then execute lusrmgr.msc
2. Open [Local Users and Groups] -> [Users] folder and select the User.
3. Select the 'Properties' menu for the user.
4. Select the 'General' Tab.
5. Check the "Account is disabled" check box.

To change the password

For Windows NT:
1. Open User Manager.
2. Select the user from the list.
3. Select 'Properties' entry from the User menu.
4. Type new password and confirm new password.

For a Windows 2000 domain:
1. Start Active Directory Users and Computers Management Console (dsa.msc) from a command prompt.
2. Open the Users folder and right-click the user Object.
3. Select "Reset Password".
4. Type new password and confirm password.

For a stand-alone Windows 2000 computer:
1. Start Local Users and Groups Management Console (lusrmgr.msc) from a command prompt.
2. Open the Users folder and right-click the user object.
3. Select "Set Password".
4. Type new password and confirm new password.

For Windows XP, 2003, VISTA, 7, 2008, 8, 2012, 10, 2016, 2019:
1. Start menu, select Run and then execute lusrmgr.msc
2. Open [Local Users and Groups] -> [Users] folder and select the User.
3. Right mouse click on the user entry.
4. Select "Set Password".
5. Type new password and confirm new password.
Related URL CVE-1999-0503 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)