CVE-2000-0197: The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto
The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.
AI Analysis
Technical Summary
CVE-2000-0197 is a medium-severity vulnerability affecting Microsoft Windows NT 4.0. The issue arises from the Windows NT scheduler using the drive mappings of the interactive user currently logged onto the system when executing scheduled batch files. This behavior allows a local user to exploit the scheduler by substituting a Trojan horse batch file in place of the legitimate one. Because the scheduler relies on the user's drive mappings, the malicious batch file can be executed with elevated privileges, potentially allowing privilege escalation. The vulnerability does not require authentication but does require local access to the system. The CVSS score of 4.6 reflects a medium impact with partial confidentiality, integrity, and availability compromise possible. No patch is available for this vulnerability, and no known exploits have been reported in the wild. The vulnerability primarily affects Windows NT 4.0 systems, which are legacy and largely obsolete in modern environments.
Potential Impact
For European organizations, the impact of this vulnerability is limited but still notable in environments where legacy Windows NT 4.0 systems remain in use, such as in industrial control systems, legacy financial systems, or specialized infrastructure. Exploitation could allow a local attacker to escalate privileges, potentially leading to unauthorized access to sensitive data, modification of system configurations, or disruption of services. Given the age of the affected product, most modern enterprises have migrated away from Windows NT 4.0, reducing the overall risk. However, organizations with legacy systems that are not regularly updated or isolated could face increased risk. The vulnerability could be leveraged to gain a foothold for further lateral movement or persistence within a network. Confidentiality, integrity, and availability could all be partially compromised if exploited.
Mitigation Recommendations
Since no official patch is available, European organizations should focus on compensating controls. These include: 1) Isolating legacy Windows NT 4.0 systems from the main corporate network using network segmentation and strict access controls to limit local user access. 2) Restricting local user permissions to prevent unauthorized users from creating or modifying batch files in scheduled task directories. 3) Auditing and monitoring scheduled tasks and batch files for unauthorized changes or suspicious activity. 4) Where possible, migrating legacy systems to supported operating systems to eliminate exposure. 5) Employing application whitelisting to prevent execution of unauthorized batch files. 6) Educating local users about the risks of executing untrusted scripts and maintaining strict operational procedures for managing scheduled tasks.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-2000-0197: The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto
Description
The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.
AI-Powered Analysis
Technical Analysis
CVE-2000-0197 is a medium-severity vulnerability affecting Microsoft Windows NT 4.0. The issue arises from the Windows NT scheduler using the drive mappings of the interactive user currently logged onto the system when executing scheduled batch files. This behavior allows a local user to exploit the scheduler by substituting a Trojan horse batch file in place of the legitimate one. Because the scheduler relies on the user's drive mappings, the malicious batch file can be executed with elevated privileges, potentially allowing privilege escalation. The vulnerability does not require authentication but does require local access to the system. The CVSS score of 4.6 reflects a medium impact with partial confidentiality, integrity, and availability compromise possible. No patch is available for this vulnerability, and no known exploits have been reported in the wild. The vulnerability primarily affects Windows NT 4.0 systems, which are legacy and largely obsolete in modern environments.
Potential Impact
For European organizations, the impact of this vulnerability is limited but still notable in environments where legacy Windows NT 4.0 systems remain in use, such as in industrial control systems, legacy financial systems, or specialized infrastructure. Exploitation could allow a local attacker to escalate privileges, potentially leading to unauthorized access to sensitive data, modification of system configurations, or disruption of services. Given the age of the affected product, most modern enterprises have migrated away from Windows NT 4.0, reducing the overall risk. However, organizations with legacy systems that are not regularly updated or isolated could face increased risk. The vulnerability could be leveraged to gain a foothold for further lateral movement or persistence within a network. Confidentiality, integrity, and availability could all be partially compromised if exploited.
Mitigation Recommendations
Since no official patch is available, European organizations should focus on compensating controls. These include: 1) Isolating legacy Windows NT 4.0 systems from the main corporate network using network segmentation and strict access controls to limit local user access. 2) Restricting local user permissions to prevent unauthorized users from creating or modifying batch files in scheduled task directories. 3) Auditing and monitoring scheduled tasks and batch files for unauthorized changes or suspicious activity. 4) Where possible, migrating legacy systems to supported operating systems to eliminate exposure. 5) Employing application whitelisting to prevent execution of unauthorized batch files. 6) Educating local users about the risks of executing untrusted scripts and maintaining strict operational procedures for managing scheduled tasks.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32db6fd31d6ed7df823
Added to database: 5/20/2025, 3:43:41 PM
Last enriched: 7/1/2025, 3:40:03 AM
Last updated: 8/12/2025, 10:50:46 AM
Views: 14
Related Threats
CVE-2025-55197: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumCVE-2025-8929: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-8928: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-8927: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumCVE-2025-8926: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.