Skip to main content

CVE-1999-0200: Windows NT FTP server (WFTP) with the guest account enabled without a password allows an attacker to

High
VulnerabilityCVE-1999-0200cve-1999-0200
Published: Fri Jan 01 1999 (01/01/1999, 05:00:00 UTC)
Source: NVD

Description

Windows NT FTP server (WFTP) with the guest account enabled without a password allows an attacker to log into the FTP server using any username and password.

AI-Powered Analysis

AILast updated: 06/29/2025, 07:56:04 UTC

Technical Analysis

CVE-1999-0200 is a critical vulnerability affecting the Windows NT FTP server (WFTP) when the guest account is enabled without a password. This misconfiguration allows an attacker to bypass authentication controls entirely by logging into the FTP server using any arbitrary username and password. Essentially, the server does not validate credentials properly, granting unauthorized access. The vulnerability stems from the FTP server's handling of the guest account, which, if left enabled and without a password, creates an open access point. Exploitation requires no authentication and no user interaction, making it trivially exploitable over the network. Once access is gained, an attacker can potentially read, modify, or delete files on the FTP server, leading to full compromise of confidentiality, integrity, and availability of data hosted on the server. Given the CVSS score of 10.0 (critical), the vulnerability represents a severe risk. Although this vulnerability dates back to 1999 and affects legacy Windows NT systems, organizations still running such outdated infrastructure remain at risk. No official patch is available, so mitigation relies on configuration changes or decommissioning the vulnerable service. The vulnerability is network exploitable with low attack complexity and no privileges required, making it a prime target for attackers seeking easy entry points into legacy environments.

Potential Impact

For European organizations, the impact of this vulnerability can be significant if legacy Windows NT FTP servers are still in operation, particularly in industrial, governmental, or critical infrastructure sectors where legacy systems sometimes persist. Unauthorized access to FTP servers can lead to data breaches involving sensitive or regulated information, disruption of business operations through data tampering or deletion, and potential lateral movement within the network to compromise additional systems. Given the critical nature of the vulnerability, attackers could fully compromise affected servers, leading to loss of confidentiality, integrity, and availability. This can result in regulatory penalties under GDPR if personal data is exposed, reputational damage, and operational downtime. Although modern systems have largely replaced Windows NT, some European organizations with legacy environments or insufficient patch management may still be vulnerable, especially in sectors with long system lifecycles such as manufacturing, utilities, or public administration.

Mitigation Recommendations

Since no official patch is available for this vulnerability, mitigation must focus on configuration and network controls. First, immediately disable the guest account on any Windows NT FTP servers or ensure it is protected with a strong password. If possible, disable the FTP service entirely and replace it with more secure file transfer protocols such as SFTP or FTPS. Restrict network access to FTP servers using firewalls or network segmentation to limit exposure only to trusted hosts. Conduct thorough audits to identify any legacy Windows NT FTP servers in the environment and prioritize their upgrade or decommissioning. Implement strict monitoring and logging of FTP access to detect any unauthorized login attempts. Additionally, educate IT staff about the risks of leaving default or guest accounts enabled without passwords. For environments where legacy systems must remain operational, consider deploying compensating controls such as VPN access or jump hosts to reduce direct exposure of vulnerable FTP servers to the internet or untrusted networks.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7debaa

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/29/2025, 7:56:04 AM

Last updated: 7/31/2025, 7:16:46 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats