Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0156: wu-ftpd FTP daemon allows any user and password combination.

0
Medium
VulnerabilityCVE-1999-0156cve-1999-0156
Published: Tue Jul 01 1997 (07/01/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: washington_university
Product: wu-ftpd

Description

wu-ftpd FTP daemon allows any user and password combination.

AI-Powered Analysis

AILast updated: 07/01/2025, 23:42:05 UTC

Technical Analysis

CVE-1999-0156 is a vulnerability in the wu-ftpd FTP daemon, a widely used FTP server software developed by Washington University. The vulnerability allows any user to authenticate with any password combination, effectively bypassing authentication controls. This flaw means that an attacker can gain unauthorized access to the FTP server without valid credentials. The vulnerability was published in 1997 and has a CVSS score of 4.6, indicating a medium severity level. The CVSS vector (AV:L/AC:L/Au:N/C:P/I:P/A:P) indicates that the attack requires local access (AV:L), has low attack complexity (AC:L), requires no authentication (Au:N), and impacts confidentiality, integrity, and availability. Since no patches are available and no known exploits are reported in the wild, the vulnerability likely affects legacy systems still running unpatched versions of wu-ftpd. The lack of authentication enforcement can lead to unauthorized data access, modification, or deletion, and potentially allow attackers to upload malicious files or disrupt services. Given the age of the vulnerability, modern systems are less likely to be affected, but legacy or embedded systems may still be vulnerable if wu-ftpd is in use.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to legacy systems that continue to run the vulnerable wu-ftpd daemon. Unauthorized access to FTP servers can lead to data breaches, exposing sensitive or regulated information, which is particularly critical under GDPR regulations. Attackers could modify or delete files, impacting data integrity and availability of services relying on FTP. Additionally, compromised FTP servers could be used as pivot points for further network intrusion or malware distribution. Organizations in sectors with legacy infrastructure such as manufacturing, utilities, or government agencies may be at higher risk. The medium severity rating reflects the requirement for local access, which limits remote exploitation but does not eliminate risk from insider threats or attackers who have gained initial footholds.

Mitigation Recommendations

Given that no patches are available for this vulnerability, European organizations should prioritize the following mitigations: 1) Identify and inventory all systems running wu-ftpd, especially legacy or embedded devices. 2) Replace wu-ftpd with modern, actively maintained FTP server software that enforces strong authentication and supports secure protocols like FTPS or SFTP. 3) Restrict local access to systems running vulnerable wu-ftpd instances through network segmentation, strict access controls, and monitoring. 4) Implement strong logging and alerting on FTP server access to detect unauthorized login attempts. 5) Where replacement is not immediately feasible, disable FTP services or restrict them to trusted users only. 6) Conduct regular security audits and vulnerability assessments focusing on legacy systems. 7) Educate internal users about the risks of legacy FTP services and enforce policies to minimize their use.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de725

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 11:42:05 PM

Last updated: 2/7/2026, 11:24:58 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats