CVE-2000-0089: The rdisk utility in Microsoft Terminal Server Edition and Windows NT 4.0 stores registry hive infor
The rdisk utility in Microsoft Terminal Server Edition and Windows NT 4.0 stores registry hive information in a temporary file with permissions that allow local users to read it, aka the "RDISK Registry Enumeration File" vulnerability.
AI Analysis
Technical Summary
CVE-2000-0089 is a vulnerability identified in the rdisk utility of Microsoft Terminal Server Edition and Windows NT 4.0. The issue arises because the rdisk utility stores registry hive information in a temporary file with overly permissive access controls. Specifically, local users can read this temporary file, which contains sensitive registry hive data. This exposure can lead to unauthorized disclosure of potentially sensitive configuration information stored in the registry hives. The vulnerability does not allow modification or deletion of data, nor does it enable remote exploitation or denial of service. It is a local information disclosure vulnerability that requires local access to the affected system. The CVSS score assigned is 2.1 (low severity), reflecting the limited impact and the requirement for local access without authentication. A patch addressing this vulnerability was released by Microsoft in the MS00-004 security bulletin. No known exploits have been reported in the wild, indicating limited active exploitation. The vulnerability primarily affects legacy systems running Windows NT 4.0 and Terminal Server Edition, which are largely obsolete in modern environments.
Potential Impact
For European organizations, the direct impact of this vulnerability today is minimal due to the obsolescence of Windows NT 4.0 and Terminal Server Edition in enterprise environments. However, organizations that still maintain legacy systems for critical operations or compliance reasons could be at risk of local information disclosure. An attacker with local access could leverage this vulnerability to gather registry hive information, potentially aiding in further privilege escalation or lateral movement within the network. While the confidentiality impact is limited to information disclosure, it could facilitate more sophisticated attacks if combined with other vulnerabilities. The vulnerability does not affect system integrity or availability. Given the age of the affected products, most European organizations have likely migrated to newer Windows versions, reducing the practical risk. Nonetheless, legacy systems in sectors such as manufacturing, utilities, or government that have long upgrade cycles might still be vulnerable.
Mitigation Recommendations
European organizations should ensure that all legacy Windows NT 4.0 and Terminal Server Edition systems are either decommissioned or upgraded to supported operating systems with current security patches. For environments where legacy systems must remain operational, apply the Microsoft patch MS00-004 immediately to remediate the vulnerability. Additionally, restrict local access to these legacy systems by enforcing strict physical and network access controls, such as limiting user accounts with local login privileges and using network segmentation to isolate legacy systems. Employ monitoring and auditing to detect unauthorized local access attempts. Consider using host-based intrusion detection systems (HIDS) to alert on suspicious file access or privilege escalation attempts. Finally, document and regularly review legacy system inventories to identify and prioritize remediation of unsupported software.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-2000-0089: The rdisk utility in Microsoft Terminal Server Edition and Windows NT 4.0 stores registry hive infor
Description
The rdisk utility in Microsoft Terminal Server Edition and Windows NT 4.0 stores registry hive information in a temporary file with permissions that allow local users to read it, aka the "RDISK Registry Enumeration File" vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2000-0089 is a vulnerability identified in the rdisk utility of Microsoft Terminal Server Edition and Windows NT 4.0. The issue arises because the rdisk utility stores registry hive information in a temporary file with overly permissive access controls. Specifically, local users can read this temporary file, which contains sensitive registry hive data. This exposure can lead to unauthorized disclosure of potentially sensitive configuration information stored in the registry hives. The vulnerability does not allow modification or deletion of data, nor does it enable remote exploitation or denial of service. It is a local information disclosure vulnerability that requires local access to the affected system. The CVSS score assigned is 2.1 (low severity), reflecting the limited impact and the requirement for local access without authentication. A patch addressing this vulnerability was released by Microsoft in the MS00-004 security bulletin. No known exploits have been reported in the wild, indicating limited active exploitation. The vulnerability primarily affects legacy systems running Windows NT 4.0 and Terminal Server Edition, which are largely obsolete in modern environments.
Potential Impact
For European organizations, the direct impact of this vulnerability today is minimal due to the obsolescence of Windows NT 4.0 and Terminal Server Edition in enterprise environments. However, organizations that still maintain legacy systems for critical operations or compliance reasons could be at risk of local information disclosure. An attacker with local access could leverage this vulnerability to gather registry hive information, potentially aiding in further privilege escalation or lateral movement within the network. While the confidentiality impact is limited to information disclosure, it could facilitate more sophisticated attacks if combined with other vulnerabilities. The vulnerability does not affect system integrity or availability. Given the age of the affected products, most European organizations have likely migrated to newer Windows versions, reducing the practical risk. Nonetheless, legacy systems in sectors such as manufacturing, utilities, or government that have long upgrade cycles might still be vulnerable.
Mitigation Recommendations
European organizations should ensure that all legacy Windows NT 4.0 and Terminal Server Edition systems are either decommissioned or upgraded to supported operating systems with current security patches. For environments where legacy systems must remain operational, apply the Microsoft patch MS00-004 immediately to remediate the vulnerability. Additionally, restrict local access to these legacy systems by enforcing strict physical and network access controls, such as limiting user accounts with local login privileges and using network segmentation to isolate legacy systems. Employ monitoring and auditing to detect unauthorized local access attempts. Consider using host-based intrusion detection systems (HIDS) to alert on suspicious file access or privilege escalation attempts. Finally, document and regularly review legacy system inventories to identify and prioritize remediation of unsupported software.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Patch Information
Threat ID: 682ca32db6fd31d6ed7df7f8
Added to database: 5/20/2025, 3:43:41 PM
Last enriched: 7/1/2025, 4:40:39 AM
Last updated: 7/27/2025, 1:46:16 AM
Views: 14
Related Threats
CVE-2025-42955: CWE-862: Missing Authorization in SAP_SE SAP Cloud Connector
LowCVE-2025-42941: CWE-1022: Use of Web Link to Untrusted Target with window.opener Access in SAP_SE SAP Fiori (Launchpad)
LowCVE-2025-53857: CWE-862: Missing Authorization in Mattermost Mattermost Confluence Plugin
LowCVE-2025-49221: CWE-862: Missing Authorization in Mattermost Mattermost Confluence Plugin
LowCVE-2025-8774: Observable Timing Discrepancy in riscv-boom SonicBOOM
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.