CVE-2000-0155: Windows NT Autorun executes the autorun.inf file on non-removable media, which allows local attacker
Windows NT Autorun executes the autorun.inf file on non-removable media, which allows local attackers to specify an alternate program to execute when other users access a drive.
AI Analysis
Technical Summary
CVE-2000-0155 is a high-severity vulnerability affecting Microsoft Windows NT 4.0, specifically related to the Autorun feature. The vulnerability arises because Windows NT Autorun executes the autorun.inf file located on non-removable media drives. Normally, autorun.inf files are used on removable media like CDs or USB drives to automatically launch programs. However, in this case, the system improperly processes autorun.inf files on fixed drives, allowing a local attacker to craft an autorun.inf file that specifies an alternate program to execute. When other users access the compromised drive, the specified malicious program is executed automatically without their explicit consent or awareness. This behavior can lead to arbitrary code execution with the privileges of the user accessing the drive. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code), indicating that it allows execution of attacker-controlled code. The CVSS v2 base score is 7.2 (high), with the vector AV:L/AC:L/Au:N/C:C/I:C/A:C, meaning the attack requires local access but no authentication, has low complexity, and impacts confidentiality, integrity, and availability fully. There is no patch available for this vulnerability, and no known exploits have been reported in the wild. The affected product is Windows NT 4.0, an outdated operating system no longer supported by Microsoft. This vulnerability primarily affects legacy systems still running Windows NT 4.0 with Autorun enabled on fixed drives, allowing local attackers to escalate privileges or execute arbitrary code by placing a crafted autorun.inf file on a non-removable drive accessible by other users.
Potential Impact
For European organizations, the impact of CVE-2000-0155 is generally limited due to the obsolescence of Windows NT 4.0 in modern IT environments. However, certain legacy industrial control systems, embedded devices, or specialized infrastructure in sectors such as manufacturing, utilities, or government agencies may still run Windows NT 4.0 or similar legacy systems. In such cases, the vulnerability could allow local attackers to execute arbitrary code with user-level privileges, potentially leading to unauthorized access, data compromise, or disruption of critical operations. The full compromise of confidentiality, integrity, and availability is possible if exploited. Since the attack requires local access, the threat vector is primarily insider threats or attackers who have gained initial foothold on the network or physical access to affected machines. The lack of a patch means organizations must rely on compensating controls. The risk is higher in environments where legacy systems are interconnected with modern networks, increasing the potential for lateral movement and broader impact. Overall, while the direct risk to most European organizations is low due to the rarity of Windows NT 4.0 usage, critical infrastructure or legacy-dependent sectors may face moderate risk if mitigation is not applied.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement specific mitigations to reduce risk from CVE-2000-0155. First, identify and inventory all systems running Windows NT 4.0 or similar legacy OS versions. For these systems, disable the Autorun feature on all fixed drives via system configuration or group policies to prevent automatic execution of autorun.inf files. Restrict local user permissions to prevent unauthorized creation or modification of autorun.inf files on fixed drives. Implement strict access controls and monitoring on legacy systems to detect unauthorized file changes or suspicious activity. Where possible, isolate legacy systems from the main corporate network using network segmentation or air-gapping to limit attacker movement. Employ endpoint security solutions capable of detecting and blocking execution of unauthorized programs triggered by autorun.inf files. Conduct user awareness training focused on risks of local attacks and the importance of physical security. Finally, plan and prioritize migration away from Windows NT 4.0 to supported operating systems to eliminate exposure to this and other legacy vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-2000-0155: Windows NT Autorun executes the autorun.inf file on non-removable media, which allows local attacker
Description
Windows NT Autorun executes the autorun.inf file on non-removable media, which allows local attackers to specify an alternate program to execute when other users access a drive.
AI-Powered Analysis
Technical Analysis
CVE-2000-0155 is a high-severity vulnerability affecting Microsoft Windows NT 4.0, specifically related to the Autorun feature. The vulnerability arises because Windows NT Autorun executes the autorun.inf file located on non-removable media drives. Normally, autorun.inf files are used on removable media like CDs or USB drives to automatically launch programs. However, in this case, the system improperly processes autorun.inf files on fixed drives, allowing a local attacker to craft an autorun.inf file that specifies an alternate program to execute. When other users access the compromised drive, the specified malicious program is executed automatically without their explicit consent or awareness. This behavior can lead to arbitrary code execution with the privileges of the user accessing the drive. The vulnerability is classified under CWE-94 (Improper Control of Generation of Code), indicating that it allows execution of attacker-controlled code. The CVSS v2 base score is 7.2 (high), with the vector AV:L/AC:L/Au:N/C:C/I:C/A:C, meaning the attack requires local access but no authentication, has low complexity, and impacts confidentiality, integrity, and availability fully. There is no patch available for this vulnerability, and no known exploits have been reported in the wild. The affected product is Windows NT 4.0, an outdated operating system no longer supported by Microsoft. This vulnerability primarily affects legacy systems still running Windows NT 4.0 with Autorun enabled on fixed drives, allowing local attackers to escalate privileges or execute arbitrary code by placing a crafted autorun.inf file on a non-removable drive accessible by other users.
Potential Impact
For European organizations, the impact of CVE-2000-0155 is generally limited due to the obsolescence of Windows NT 4.0 in modern IT environments. However, certain legacy industrial control systems, embedded devices, or specialized infrastructure in sectors such as manufacturing, utilities, or government agencies may still run Windows NT 4.0 or similar legacy systems. In such cases, the vulnerability could allow local attackers to execute arbitrary code with user-level privileges, potentially leading to unauthorized access, data compromise, or disruption of critical operations. The full compromise of confidentiality, integrity, and availability is possible if exploited. Since the attack requires local access, the threat vector is primarily insider threats or attackers who have gained initial foothold on the network or physical access to affected machines. The lack of a patch means organizations must rely on compensating controls. The risk is higher in environments where legacy systems are interconnected with modern networks, increasing the potential for lateral movement and broader impact. Overall, while the direct risk to most European organizations is low due to the rarity of Windows NT 4.0 usage, critical infrastructure or legacy-dependent sectors may face moderate risk if mitigation is not applied.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement specific mitigations to reduce risk from CVE-2000-0155. First, identify and inventory all systems running Windows NT 4.0 or similar legacy OS versions. For these systems, disable the Autorun feature on all fixed drives via system configuration or group policies to prevent automatic execution of autorun.inf files. Restrict local user permissions to prevent unauthorized creation or modification of autorun.inf files on fixed drives. Implement strict access controls and monitoring on legacy systems to detect unauthorized file changes or suspicious activity. Where possible, isolate legacy systems from the main corporate network using network segmentation or air-gapping to limit attacker movement. Employ endpoint security solutions capable of detecting and blocking execution of unauthorized programs triggered by autorun.inf files. Conduct user awareness training focused on risks of local attacks and the importance of physical security. Finally, plan and prioritize migration away from Windows NT 4.0 to supported operating systems to eliminate exposure to this and other legacy vulnerabilities.
Affected Countries
Threat ID: 682ca32db6fd31d6ed7df840
Added to database: 5/20/2025, 3:43:41 PM
Last enriched: 6/25/2025, 12:00:21 PM
Last updated: 2/7/2026, 1:57:19 AM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.