Possible password flaw discovered in Windows XP

A security flaw recently revealed in Microsoft Corp.’s Windows XP could enable unauthorized users to access password-protected PCs.

Using the Windows 2000 CD, anonymous users can apparently boot up a computer with the Windows XP OS and call up the troubleshooting program Windows 2000 Recovery Console.

Using the program’s system recovery routine, the unauthorized user can then work under the guise of a Windows XP Adminstrator, effectively rendering any passwords useless. The flaw affects all XP user accounts, password-protected or not – visitors can then access files from the hard drive and copy to any removable media.

Representatives from Microsoft were not immediately available for comment.

Thomas Slodichak, chief security officer for WhiteHat Inc. in Burlington, Ont., said the possible flaw was brought to his attention on Monday.

“It seems as though XP has a bit of programming missing that was included in its predecessor Windows 2000,” the security expert said.

Although Microsoft hasn’t officially confirmed the XP flaw, it highlights the notion, Slodichak said, that proper security practices within the enterprise are paramount. Even if this access flaw is confirmed “there are tons of other routines available that enable you to break into a workstation,” Slodichak said.

Enterprises face an endless see-saw battle between security and convenience, Slodichak said. “You can prevent this kind of thing from happening by changing settings in the BIOS and making sure you can’t boot from the CD or floppy disk.” On the flipside, organizations may argue this usually ends up making networks less manageable, software upgrades harder to implement and ultimately results in more calls to the help desk, he added.

But the overall consensus within the security community, Slodichak continued, is that as long as there is any physical access to a box, data can be improperly accessed. “If a Windows box can be broken, let’s make sure that there isn’t data on it that can be leveraged or (is at least) encrypted…let’s put the data on the servers, behind locked door where it belongs,” Slodichak said.

“It’s a question of corporate policy – if the data is on servers it can’t breached or touched in this manner. It’s safe, it’s secure from the standpoint that it will be backed up on corporate data back-up systems.”

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now