• CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information
A Windows NT system's user audit policy does not log an event success or failure, e.g. for Logon and Logoff, File and Object Access, Use of User Rights, User and Group Management, Security Policy Changes, Restart, Shutdown, and System, and Process Tracking.
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
Assigning CNA
MITRE Corporation
Date Record Created
19990607 Disclaimer: The record creation date may reflect when the CVE ID was allocated or reserved, and does not necessarily indicate when this vulnerability was discovered, shared with the affected vendor, publicly disclosed, or updated in CVE.
Phase (Legacy)
Proposed (19990721)
Votes (Legacy)
ACCEPT(4) Christey, Ozancin, Shostack, Wall
MODIFY(1) Frech
RECAST(2) Baker, Northcutt
Comments (Legacy)
 Northcutt> It isn't a great truth that you should enable all or the above, if you
   do you potentially introduce a vulnerbility of filling up the file
   system with stuff you will never look at.
 Ozancin> It is far less interesting what a user does successfully that what they
   attempt and fail at.
 Christey> The list of event types is very useful for lookup.
 Frech> XF:nt-system-audit
 CHANGE> [Baker changed vote from REVIEWING to RECAST]

Proposed (Legacy)
This is a record on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities.