| VID |
28344 |
| Severity |
30 |
| Port |
139,445 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
Automatic hidden shares has been detected as being enabled on the target Windows host. By default, Windows NT and Windows 2000 creates the administrative shares (C$, D$, ADMIN$) for all physical drives. Although you delete these shares, they will be recreated when you reboot. If a remote attacker could log in to the affected host with administrator account, then this setting would allow the attacker to access arbitrary files by mapping the network drive.
* Platforms Affected: Microsoft Windows NT Any version Microsoft Windows 2000 Any version Microsoft Windows XP Any version Microsoft Windows Server 2003 Microsoft Windows 7, 8 Microsoft Windows Server 2008, 2012 |
| Recommendation |
If security is a concern the administrative share can be disabled. This will prevent users in the administrators group from accessing your drives. If an application depends on this server this feature must not be disabled. To disable this feature, using regedit, edit the following Registry entry:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\LanmanServer\Parameters
On Windows NT/2000/2003 Server, double click on AutoShareServer and set it to 0. On Windows NT/2000/XP Workstation, double click on AutoShareWks and set it to 0.
If the entry is not present, Create the registry entry above and add value of type REG_DWORD.
Restart Windows and the automatic shares should not be created. |
| Related URL |
(CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
2580,2581,4603 (ISS) |
|