• Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings
The default configuration of SYSKEY in Windows 2000 stores the startup key in the registry, which could allow an attacker tor ecover it and use it to decrypt Encrypted File System (EFS) data.
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
Date Entry Created
20000614 Disclaimer: The entry creation date may reflect when the CVE-ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.
Phase (Legacy)
Proposed (20000615)
Votes (Legacy)
ACCEPT(2) Levy, Ozancin
MODIFY(1) Frech
NOOP(2) Cole, Stracener
REJECT(1) LeBlanc
Comments (Legacy)
 LeBlanc> This is not a vulnerability.  It is essentially an advisory on best
   practices. Also, the description is extremely inaccurate. If I weren't
   intimately familiar with the issue, I would not be able to understand it
   from this. Syskey, when applied at lower levels, has well-documented
 Stracener> " recover"
 Frech> XF:win2k-syskey-default-configuration
   Change "tor ecover" to "to recover"

Proposed (Legacy)
This is an entry on the CVE list, which standardizes names for security problems.