Skip to main content

CVE-1999-0170: Remote attackers can mount an NFS file system in Ultrix or OSF, even if it is denied on the access l

High
VulnerabilityCVE-1999-0170cve-1999-0170
Published: Wed Jan 01 1997 (01/01/1997, 05:00:00 UTC)
Source: NVD
Vendor/Project: digital
Product: ultrix

Description

Remote attackers can mount an NFS file system in Ultrix or OSF, even if it is denied on the access list.

AI-Powered Analysis

AILast updated: 07/01/2025, 13:41:29 UTC

Technical Analysis

CVE-1999-0170 is a high-severity vulnerability affecting the Network File System (NFS) implementation in Digital Equipment Corporation's Ultrix and OSF operating systems. The vulnerability allows remote attackers to mount an NFS file system on a target machine even if the access control list (ACL) explicitly denies such mounting. This bypass of access restrictions means that an attacker can gain unauthorized access to file systems that should be protected, potentially exposing sensitive data or enabling further compromise. The vulnerability arises from improper enforcement of access control policies within the NFS server component, allowing remote unauthenticated attackers to circumvent restrictions. Given that NFS is a protocol used to share files over a network, this flaw undermines the confidentiality, integrity, and availability of the affected systems' data. The CVSS score of 7.5 (high) reflects the ease of exploitation (network vector, no authentication required, low attack complexity) and the significant impact on confidentiality, integrity, and availability. Although this vulnerability was published in 1997 and no patches are available, it remains relevant in legacy environments still running Ultrix or OSF systems. No known exploits in the wild have been reported, but the theoretical risk remains significant due to the nature of the flaw.

Potential Impact

For European organizations, the impact of CVE-1999-0170 depends largely on the presence of legacy Ultrix or OSF systems within their infrastructure. Organizations that maintain older industrial control systems, research environments, or specialized legacy applications might still operate these systems. Exploitation could lead to unauthorized data access, data tampering, or disruption of critical services relying on NFS shares. Confidential information could be exposed or altered, potentially violating data protection regulations such as GDPR. Additionally, attackers gaining foothold through this vulnerability could pivot to other internal systems, increasing the risk of broader compromise. The lack of available patches means organizations must rely on compensating controls to mitigate risk. While modern systems are not affected, the presence of legacy systems in sectors like manufacturing, academia, or government could pose a risk if network segmentation and monitoring are insufficient.

Mitigation Recommendations

Since no patches are available for this vulnerability, European organizations should implement strict network segmentation to isolate any Ultrix or OSF systems from untrusted networks, especially the internet. Access to NFS services should be restricted using firewall rules to allow only trusted hosts. Employ network-level authentication and encryption where possible to protect NFS traffic. Monitoring and logging of NFS mount requests can help detect unauthorized attempts. If feasible, organizations should plan to decommission or upgrade legacy Ultrix/OSF systems to supported platforms that receive security updates. Additionally, implementing intrusion detection systems (IDS) with signatures for anomalous NFS activity can provide early warning of exploitation attempts. Regular security audits and vulnerability assessments focusing on legacy systems are critical to maintaining awareness of exposure.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de598

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 1:41:29 PM

Last updated: 7/30/2025, 10:30:03 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats