Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0078: pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands

0
Low
VulnerabilityCVE-1999-0078cve-1999-0078
Published: Thu Apr 18 1996 (04/18/1996, 04:00:00 UTC)
Source: NVD
Vendor/Project: ncr
Product: mp-ras

Description

pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 07/02/2025, 00:56:04 UTC

Technical Analysis

CVE-1999-0078 is a vulnerability in the pcnfsd daemon (also known as rpc.pcnfsd), which is part of the NCR MP-RAS product suite. This vulnerability allows local users to manipulate file permissions or execute arbitrary commands by exploiting the arguments passed in the RPC (Remote Procedure Call) interface. The affected versions span multiple releases of MP-RAS, including versions 2.03 through 6.2 and several intermediate versions. The vulnerability arises because pcnfsd does not properly validate or restrict the input parameters it receives, enabling a local attacker to escalate privileges or alter system files by changing permissions or injecting commands. The CVSS score is low (1.9), reflecting that exploitation requires local access, moderate complexity, and does not impact confidentiality or availability significantly. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of this vulnerability (published in 1996), it primarily affects legacy systems still running these older MP-RAS versions. The risk is limited to local users who already have some access to the system, but the ability to execute arbitrary commands can lead to privilege escalation and compromise of system integrity.

Potential Impact

For European organizations, the impact of CVE-1999-0078 is generally low due to the obsolescence of the affected software and the requirement for local access to exploit the vulnerability. However, organizations that maintain legacy systems running NCR MP-RAS versions affected by this vulnerability could face risks of unauthorized privilege escalation and unauthorized modification of file permissions. This could lead to unauthorized changes in system configurations or the execution of malicious code, potentially compromising system integrity and leading to further lateral movement within the network. In critical infrastructure or industrial environments where legacy systems are still in operation, such exploitation could disrupt operations or lead to data integrity issues. However, the lack of remote exploitability and the absence of known active exploits reduce the immediate threat level. Nonetheless, organizations should be aware of this vulnerability when performing risk assessments on legacy systems and consider isolating or upgrading affected systems to mitigate potential risks.

Mitigation Recommendations

Given that no official patches are available for CVE-1999-0078, mitigation must focus on compensating controls. Organizations should: 1) Restrict local access to systems running affected MP-RAS versions to trusted administrators only, minimizing the risk of local exploitation. 2) Implement strict access controls and monitoring on legacy systems to detect any unauthorized changes in file permissions or suspicious command executions. 3) Where possible, isolate legacy MP-RAS systems from the main network to limit potential lateral movement if compromised. 4) Consider migrating or upgrading legacy systems to supported platforms that do not contain this vulnerability. 5) Employ host-based intrusion detection systems (HIDS) to monitor for anomalous RPC calls or unauthorized privilege escalations. 6) Conduct regular audits of file permissions and system configurations on affected systems to detect unauthorized changes early. These steps go beyond generic advice by focusing on compensating controls tailored to legacy environments where patching is not feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Threat ID: 682ca32ab6fd31d6ed7de4d0

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/2/2025, 12:56:04 AM

Last updated: 3/24/2026, 9:19:52 PM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses