diff --git a/core/setup/controller.php b/core/setup/controller.php
index 854c30ac7698ccb87ed70af6cd179991130c169b..c059a48655e4618a76fe28b7d104fa2cbe6e940e 100644
--- a/core/setup/controller.php
+++ b/core/setup/controller.php
@@ -131,10 +131,6 @@ class Controller {
 		$databases = $setup->getSupportedDatabases();
 
 		$dataDir = $this->config->getSystemValue('datadirectory', \OC::$SERVERROOT.'/data');
-		$vulnerableToNullByte = false;
-		if(@file_exists(__FILE__."\0Nullbyte")) { // Check if the used PHP version is vulnerable to the NULL Byte attack (CVE-2006-7243)
-			$vulnerableToNullByte = true;
-		} 
 
 		$errors = array();
 
@@ -200,7 +196,6 @@ class Controller {
 			'databases' => $databases,
 			'directory' => $dataDir,
 			'htaccessWorking' => $htAccessWorking,
-			'vulnerableToNullByte' => $vulnerableToNullByte,
 			'errors' => $errors,
 		);
 	}
diff --git a/core/templates/installation.php b/core/templates/installation.php
index 53ab4a0b8778891db30eb92ad5530a5fe560b627..4e9cde205d833be2958d5418b13b353c993c38f8 100644
--- a/core/templates/installation.php
+++ b/core/templates/installation.php
@@ -26,13 +26,6 @@ script('core', [
 		<?php endforeach; ?>
 	</fieldset>
 	<?php endif; ?>
-	<?php if($_['vulnerableToNullByte']): ?>
-	<fieldset class="warning">
-		<legend><strong><?php p($l->t('Security Warning'));?></strong></legend>
-		<p><?php p($l->t('Your PHP version is vulnerable to the NULL Byte attack (CVE-2006-7243)'));?><br/>
-		<?php p($l->t('Please update your PHP installation to use %s securely.', $theme->getName() )); ?></p>
-	</fieldset>
-	<?php endif; ?>
 	<?php if(!$_['htaccessWorking']): ?>
 	<fieldset class="warning">
 		<legend><strong><?php p($l->t('Security Warning'));?></strong></legend>