CVE-1999-0593: The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with
The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in.
AI Analysis
Technical Summary
CVE-1999-0593 is a vulnerability found in Microsoft Windows NT related to the default configuration of the Winlogon registry key entry named ShutdownWithoutLogon. This setting, when enabled by default, allows any user with physical access to the machine to shut down the system without needing to authenticate or log in. The vulnerability arises because the system permits shutdown operations at the login screen, which can be exploited by anyone physically present at the device. This does not allow unauthorized access to data or system control beyond shutdown, but it does impact system availability. The vulnerability is classified with a CVSS score of 4.9 (medium severity), reflecting that it requires physical access (local vector), has low attack complexity, no authentication is needed, and it impacts availability only, with no confidentiality or integrity impact. There are no patches available for this issue, and no known exploits have been reported in the wild. The affected product is Windows NT, an older Microsoft operating system no longer widely used or supported. The vulnerability is primarily a physical security concern rather than a remote or network-based threat.
Potential Impact
For European organizations, the impact of this vulnerability is limited but still relevant in environments where legacy Windows NT systems remain in use, particularly in industrial, governmental, or specialized legacy infrastructure contexts. The main risk is the potential for denial of service through unauthorized shutdowns, which could disrupt critical operations, cause data loss if unsaved work is present, or interrupt services dependent on the affected machines. Since the vulnerability requires physical access, it is less likely to be exploited remotely, but insider threats or unauthorized physical access to sensitive areas could leverage this to cause operational disruptions. The lack of confidentiality or integrity impact means sensitive data exposure or system compromise is not a direct concern from this vulnerability alone. However, availability interruptions can have cascading effects in environments with strict uptime requirements or where legacy systems interface with modern infrastructure.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first assess whether Windows NT systems are still in active use and isolate them from critical infrastructure if possible. Physical security controls must be strengthened to prevent unauthorized access to machines, including locked server rooms, restricted access policies, and surveillance. Administrators can consider modifying the ShutdownWithoutLogon registry key to disable shutdown without logon, although this may require manual configuration on legacy systems. Where feasible, migrating from Windows NT to supported and updated operating systems is strongly recommended to eliminate this and other legacy vulnerabilities. Additionally, organizations should implement monitoring to detect unexpected shutdowns and establish incident response procedures to quickly address availability disruptions. Backup power solutions and uninterruptible power supplies (UPS) can also help mitigate the impact of sudden shutdowns.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-1999-0593: The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with
Description
The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in.
AI-Powered Analysis
Technical Analysis
CVE-1999-0593 is a vulnerability found in Microsoft Windows NT related to the default configuration of the Winlogon registry key entry named ShutdownWithoutLogon. This setting, when enabled by default, allows any user with physical access to the machine to shut down the system without needing to authenticate or log in. The vulnerability arises because the system permits shutdown operations at the login screen, which can be exploited by anyone physically present at the device. This does not allow unauthorized access to data or system control beyond shutdown, but it does impact system availability. The vulnerability is classified with a CVSS score of 4.9 (medium severity), reflecting that it requires physical access (local vector), has low attack complexity, no authentication is needed, and it impacts availability only, with no confidentiality or integrity impact. There are no patches available for this issue, and no known exploits have been reported in the wild. The affected product is Windows NT, an older Microsoft operating system no longer widely used or supported. The vulnerability is primarily a physical security concern rather than a remote or network-based threat.
Potential Impact
For European organizations, the impact of this vulnerability is limited but still relevant in environments where legacy Windows NT systems remain in use, particularly in industrial, governmental, or specialized legacy infrastructure contexts. The main risk is the potential for denial of service through unauthorized shutdowns, which could disrupt critical operations, cause data loss if unsaved work is present, or interrupt services dependent on the affected machines. Since the vulnerability requires physical access, it is less likely to be exploited remotely, but insider threats or unauthorized physical access to sensitive areas could leverage this to cause operational disruptions. The lack of confidentiality or integrity impact means sensitive data exposure or system compromise is not a direct concern from this vulnerability alone. However, availability interruptions can have cascading effects in environments with strict uptime requirements or where legacy systems interface with modern infrastructure.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first assess whether Windows NT systems are still in active use and isolate them from critical infrastructure if possible. Physical security controls must be strengthened to prevent unauthorized access to machines, including locked server rooms, restricted access policies, and surveillance. Administrators can consider modifying the ShutdownWithoutLogon registry key to disable shutdown without logon, although this may require manual configuration on legacy systems. Where feasible, migrating from Windows NT to supported and updated operating systems is strongly recommended to eliminate this and other legacy vulnerabilities. Additionally, organizations should implement monitoring to detect unexpected shutdowns and establish incident response procedures to quickly address availability disruptions. Backup power solutions and uninterruptible power supplies (UPS) can also help mitigate the impact of sudden shutdowns.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32bb6fd31d6ed7dec90
Added to database: 5/20/2025, 3:43:39 PM
Last enriched: 7/1/2025, 8:55:43 PM
Last updated: 8/18/2025, 11:32:54 PM
Views: 12
Related Threats
CVE-2025-43751: CWE-203: Observable Discrepancy in Liferay Portal
MediumCVE-2025-53363: CWE-73: External Control of File Name or Path in donknap dpanel
MediumCVE-2025-36042: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in IBM QRadar SIEM
MediumCVE-2025-0754: Improper Output Neutralization for Logs
MediumCVE-2025-0752: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.