| VID |
27095 |
| Severity |
30 |
| Port |
135 |
| Protocol |
TCP |
| Class |
WMI |
| Detailed Description |
The "Allow Anonymous SID / Name Translation" policy is set to "Enable" on the remote Windows server. If this policy is set to ¡°Enable¡±, a user with local access can use the well-known Administrator SID to get the real name of the Administrator account and run a password guessing attack.
* Note: This check requires an account with administrative privileges which can log into the host to scan. Absence of this condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* Platforms Affected: Microsoft Windows Any version |
| Recommendation |
- Start / Run / SECPOL.MSC / Local Policies / Security Options - Set the ¡°Network Access: Allow Anonymous SID / Name Translation¡± policy to ¡°Disabled¡± |
| Related URL |
(CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|