Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0259: cfingerd lists all users on a system via search.**@target.

0
Medium
VulnerabilityCVE-1999-0259cve-1999-0259
Published: Fri May 23 1997 (05/23/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: infodrom
Product: cfingerd

Description

cfingerd lists all users on a system via search.**@target.

AI-Powered Analysis

AILast updated: 07/01/2025, 23:56:20 UTC

Technical Analysis

CVE-1999-0259 is a medium-severity vulnerability affecting version 1.2.2 of the cfingerd service, a finger daemon implementation from the infodrom project. The vulnerability allows an unauthenticated remote attacker to enumerate all user accounts on a system by issuing a specially crafted search query to the cfingerd service. Specifically, the service responds to search queries by listing all users on the target system, thereby disclosing sensitive information about user accounts without requiring authentication or user interaction. The vulnerability is classified with a CVSS base score of 5.0 (medium), with the vector AV:N/AC:L/Au:N/C:P/I:N/A:N, indicating that it is remotely exploitable over the network with low attack complexity, requires no authentication, and impacts confidentiality by exposing user account information. There is no patch available for this vulnerability, and no known exploits have been reported in the wild. The vulnerability dates back to 1997 and affects legacy systems running cfingerd 1.2.2, which may still be present in some legacy or embedded environments. The exposure of user account information can facilitate further reconnaissance and targeted attacks such as password guessing, social engineering, or privilege escalation attempts.

Potential Impact

For European organizations, the primary impact of this vulnerability is the unauthorized disclosure of user account information, which compromises confidentiality. While it does not directly affect system integrity or availability, the leaked user list can aid attackers in crafting more effective attacks, including brute force or credential stuffing campaigns. Organizations in Europe that still operate legacy systems or network services exposing cfingerd 1.2.2 are at risk of information leakage that could lead to further compromise. This is especially relevant for sectors with legacy infrastructure such as industrial control systems, research institutions, or governmental agencies that may have older UNIX-based systems. The vulnerability could also be leveraged as part of a broader attack chain targeting European entities, increasing the risk profile for organizations with exposed finger services.

Mitigation Recommendations

Given that no patch is available for cfingerd 1.2.2, European organizations should take immediate steps to mitigate exposure. First, disable the cfingerd service entirely if it is not strictly required, as the finger protocol is largely obsolete and unnecessary in modern environments. If the service must remain active, restrict access to the service using firewall rules or network segmentation to limit queries to trusted internal hosts only. Additionally, consider deploying intrusion detection/prevention systems to monitor and block suspicious finger queries indicative of reconnaissance attempts. Organizations should also conduct audits to identify legacy systems running cfingerd and plan for their upgrade or decommissioning. Implementing strong password policies and multi-factor authentication can reduce the risk of further compromise even if user enumeration occurs. Finally, raising awareness among system administrators about the risks of legacy services and encouraging regular vulnerability assessments will help prevent exploitation.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de6d2

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 11:56:20 PM

Last updated: 2/7/2026, 9:53:24 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats