Skip to main content

CVE-2000-0121: The Recycle Bin utility in Windows NT and Windows 2000 allows local users to read or modify files by

Low
VulnerabilityCVE-2000-0121cve-2000-0121
Published: Tue Feb 01 2000 (02/01/2000, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_nt

Description

The Recycle Bin utility in Windows NT and Windows 2000 allows local users to read or modify files by creating a subdirectory with the victim's SID in the recycler directory, aka the "Recycle Bin Creation" vulnerability.

AI-Powered Analysis

AILast updated: 07/01/2025, 05:40:55 UTC

Technical Analysis

CVE-2000-0121 is a local privilege vulnerability affecting the Recycle Bin utility in Microsoft Windows NT 4.0 and Windows 2000. The vulnerability arises because the Recycle Bin allows local users to create a subdirectory within the recycler directory named after the victim user's Security Identifier (SID). By doing so, an attacker can gain unauthorized read or write access to files that belong to other users. This occurs due to improper access control on the recycle bin directories, enabling local users to bypass file permission restrictions. The vulnerability does not allow remote exploitation and requires local access to the system. The attack vector is local (AV:L), with low attack complexity (AC:L), no authentication required (Au:N), and impacts confidentiality and integrity (C:P/I:P) but not availability (A:N). The CVSS v2 base score is 3.6, indicating a low severity. Microsoft released patches addressing this issue in security bulletin MS00-007. No known exploits have been reported in the wild, and the vulnerability primarily affects legacy systems that are no longer supported or widely used.

Potential Impact

For European organizations, the impact of CVE-2000-0121 is generally low in modern contexts because Windows NT 4.0 and Windows 2000 are obsolete operating systems that have been replaced by newer versions with improved security controls. However, some legacy industrial control systems, embedded devices, or specialized environments in Europe might still run these older OS versions, potentially exposing sensitive data to local attackers. If exploited, an attacker with local access could read or modify files belonging to other users, leading to confidentiality breaches or data tampering. This could be particularly concerning in environments with shared workstations or insufficient physical security. The vulnerability does not allow remote exploitation, so the risk is limited to insiders or attackers with physical or remote local access (e.g., via compromised credentials). Overall, the threat to European organizations is minimal unless legacy systems remain unpatched and accessible.

Mitigation Recommendations

European organizations should ensure that all systems running Windows NT 4.0 or Windows 2000 are either upgraded to supported operating systems or fully patched with the MS00-007 security update. Given the age of the affected OS versions, migration to modern Windows versions (e.g., Windows 10 or 11) is strongly recommended. For environments where legacy systems must remain operational, strict physical access controls and network segmentation should be enforced to prevent unauthorized local access. Additionally, auditing and monitoring of file system permissions on the recycler directory can help detect suspicious activity. Organizations should also implement least privilege principles to limit user permissions and reduce the risk of local exploitation. Regular vulnerability assessments should include checks for outdated OS versions and missing patches.

Need more detailed analysis?Get Pro

Threat ID: 682ca32db6fd31d6ed7df7bc

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 7/1/2025, 5:40:55 AM

Last updated: 8/14/2025, 2:25:18 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats