• CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information
The default configuration of SYSKEY in Windows 2000 stores the startup key in the registry, which could allow an attacker tor ecover it and use it to decrypt Encrypted File System (EFS) data.
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
Assigning CNA
MITRE Corporation
Date Record Created
20000614 Disclaimer: The record creation date may reflect when the CVE ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.
Phase (Legacy)
Proposed (20000615)
Votes (Legacy)
ACCEPT(2) Levy, Ozancin
MODIFY(1) Frech
NOOP(2) Cole, Stracener
REJECT(1) LeBlanc
Comments (Legacy)
 LeBlanc> This is not a vulnerability.  It is essentially an advisory on best
   practices. Also, the description is extremely inaccurate. If I weren't
   intimately familiar with the issue, I would not be able to understand it
   from this. Syskey, when applied at lower levels, has well-documented
 Stracener> " recover"
 Frech> XF:win2k-syskey-default-configuration
   Change "tor ecover" to "to recover"

Proposed (Legacy)
This is a record on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities.