Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0013: Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remo

0
High
VulnerabilityCVE-1999-0013cve-1999-0013cwe-522
Published: Thu Jan 22 1998 (01/22/1998, 05:00:00 UTC)
Source: NVD
Vendor/Project: ssh
Product: ssh

Description

Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user.

AI-Powered Analysis

AILast updated: 06/30/2025, 07:25:07 UTC

Technical Analysis

CVE-1999-0013 is a high-severity vulnerability affecting early versions of the SSH (Secure Shell) client software, specifically versions 1.2.0 through 1.2.14. The vulnerability arises from the ssh-agent program, which is designed to hold private keys used for SSH authentication in memory to facilitate single sign-on capabilities. Due to insufficient protection mechanisms in these early ssh-agent implementations, other local users on the same system can extract the credentials (private keys) stored by the ssh-agent. This unauthorized access enables attackers to impersonate the ssh-agent user and gain remote access to systems where the compromised keys are authorized. The vulnerability is characterized by a local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact on confidentiality, integrity, and availability is high, as attackers can fully compromise remote accounts and potentially pivot within networks. No patches are available for these legacy versions, and no known exploits are currently reported in the wild. The root cause aligns with CWE-522, which involves insufficiently protected credentials. This vulnerability primarily affects legacy Unix-like systems running outdated SSH clients, and modern SSH implementations have addressed these issues with improved agent security and key protection mechanisms.

Potential Impact

For European organizations, the impact of this vulnerability is significant primarily in environments where legacy SSH clients are still in use, such as in industrial control systems, legacy infrastructure, or specialized embedded devices. If exploited, attackers with local access could escalate privileges by stealing SSH keys, leading to unauthorized remote access to critical systems. This could result in data breaches, disruption of services, and lateral movement within corporate networks. Confidentiality is severely impacted as private keys are exposed, integrity is compromised through unauthorized access, and availability could be affected if attackers disrupt or manipulate remote systems. Although modern environments are less likely to be affected due to updated SSH versions, organizations with legacy systems or insufficient patch management remain at risk. The lack of available patches means mitigation relies heavily on operational controls and environment hardening.

Mitigation Recommendations

Given the absence of patches for these legacy SSH versions, European organizations should prioritize the following mitigations: 1) Upgrade all SSH clients and servers to modern, supported versions that include hardened ssh-agent implementations and improved key protection. 2) Restrict local user access on systems running SSH clients to trusted administrators only, minimizing the risk of local credential theft. 3) Employ strict access controls and monitoring on systems where ssh-agent is used, including auditing local user activities and detecting anomalous access patterns. 4) Use hardware security modules (HSMs) or secure key storage solutions where possible to prevent private key exposure in memory. 5) Implement network segmentation to limit the impact of compromised credentials and restrict lateral movement. 6) Educate system administrators about the risks of legacy SSH clients and enforce policies to phase out unsupported software. 7) Consider disabling ssh-agent forwarding or usage on multi-user systems where it is not essential. These measures collectively reduce the attack surface and mitigate the risk of credential theft in environments where upgrading is not immediately feasible.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7de8d9

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/30/2025, 7:25:07 AM

Last updated: 2/7/2026, 11:51:27 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats