Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0153: Windows 95/NT out of band (OOB) data denial of service through NETBIOS port, aka WinNuke.

0
Medium
VulnerabilityCVE-1999-0153cve-1999-0153denial of service
Published: Tue Jul 01 1997 (07/01/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_2000

Description

Windows 95/NT out of band (OOB) data denial of service through NETBIOS port, aka WinNuke.

AI-Powered Analysis

AILast updated: 07/01/2025, 23:42:16 UTC

Technical Analysis

CVE-1999-0153, commonly known as WinNuke, is a denial of service (DoS) vulnerability affecting Microsoft Windows 95 and Windows NT systems, specifically impacting Windows 2000 version 5.0 as well. The vulnerability arises from the way these operating systems handle out-of-band (OOB) data sent through the NETBIOS port (port 139). An attacker can send specially crafted OOB data packets to the vulnerable system's NETBIOS port, causing the target machine to crash or become unresponsive, effectively resulting in a denial of service. This attack does not require authentication or user interaction and can be executed remotely over a network, making it relatively easy to exploit. The vulnerability impacts availability only, with no direct compromise of confidentiality or integrity. Despite its age and the fact that modern systems have long since patched or replaced the affected versions, this vulnerability remains a historically significant example of network-level DoS attacks on Windows systems. No official patches are available for the affected versions, and no known active exploits are currently reported in the wild. The CVSS score of 5.0 reflects a medium severity, primarily due to the ease of exploitation and the impact on system availability without affecting data confidentiality or integrity.

Potential Impact

For European organizations, the direct impact of CVE-1999-0153 today is minimal given the obsolescence of Windows 95, NT, and Windows 2000 systems in production environments. However, any legacy systems still running these outdated operating systems could be vulnerable to network-based denial of service attacks, potentially disrupting critical services or internal operations. Such disruptions could lead to operational downtime, loss of productivity, and increased recovery costs. Additionally, organizations with legacy industrial control systems, embedded devices, or specialized equipment that rely on these older Windows versions might face risks if these systems are exposed to untrusted networks. The vulnerability does not allow data theft or system compromise, but availability interruptions can still have significant operational consequences, especially in sectors like manufacturing, utilities, or government services where legacy systems may persist.

Mitigation Recommendations

Given the absence of official patches for this vulnerability, the most effective mitigation is to upgrade or replace affected systems with supported versions of Windows that have addressed this issue. For organizations that must maintain legacy systems, network-level controls are critical: specifically, blocking inbound and outbound traffic on NETBIOS ports (TCP 139 and UDP 137-138) at network perimeters and internal firewalls can prevent exploitation attempts. Implementing strict network segmentation to isolate legacy systems from untrusted networks reduces exposure. Additionally, monitoring network traffic for unusual OOB data packets targeting NETBIOS ports can help detect attempted exploitation. Employing intrusion detection/prevention systems (IDS/IPS) with signatures for WinNuke attacks can provide further protection. Finally, educating IT staff about the risks of legacy systems and planning for their phased decommissioning is essential to long-term security.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de723

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 11:42:16 PM

Last updated: 2/8/2026, 5:23:41 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats