Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0320: SunOS rpc.cmsd allows attackers to obtain root access by overwriting arbitrary files.

0
High
VulnerabilityCVE-1999-0320cve-1999-0320
Published: Sun Mar 01 1998 (03/01/1998, 05:00:00 UTC)
Source: NVD
Vendor/Project: sun
Product: solaris

Description

SunOS rpc.cmsd allows attackers to obtain root access by overwriting arbitrary files.

AI-Powered Analysis

AILast updated: 06/30/2025, 05:12:11 UTC

Technical Analysis

CVE-1999-0320 is a critical vulnerability affecting multiple versions of SunOS and Solaris operating systems, specifically versions 2.4 through 5.5.1. The vulnerability resides in the rpc.cmsd (Remote Procedure Call - Cluster Management Service Daemon) component. This flaw allows an unauthenticated remote attacker to overwrite arbitrary files on the affected system, which can lead to complete system compromise. By exploiting this vulnerability, an attacker can gain root-level privileges, effectively bypassing all security controls and gaining full control over the system. The vulnerability is remotely exploitable over the network without requiring any authentication, making it highly dangerous. The CVSS v2 base score is 9.3, reflecting its critical impact on confidentiality, integrity, and availability. The attack complexity is medium, but no user interaction or authentication is needed. The vulnerability allows complete compromise of the system by overwriting critical files, potentially including system binaries or configuration files, enabling persistent root access. Despite its age and severity, no official patches are available, increasing the risk for legacy systems still in operation. Although no known exploits are currently reported in the wild, the nature of the vulnerability makes it a prime target for attackers if such systems are exposed to untrusted networks.

Potential Impact

For European organizations, the impact of this vulnerability can be severe, particularly for those still running legacy SunOS or Solaris systems in critical infrastructure, industrial environments, or specialized applications. Successful exploitation can lead to full system takeover, data breaches, disruption of services, and potential lateral movement within the network. Confidentiality is compromised due to unauthorized root access, integrity is lost as attackers can modify or overwrite arbitrary files, and availability can be affected if critical services are disrupted or systems are rendered inoperable. Given the lack of patches, organizations face a heightened risk if these legacy systems are connected to external or less trusted networks. This vulnerability could also be leveraged for espionage or sabotage, especially in sectors such as energy, telecommunications, or government services where Solaris systems have historically been deployed.

Mitigation Recommendations

Since no official patches are available, European organizations should prioritize the following mitigations: 1) Immediate isolation of affected SunOS/Solaris systems from untrusted networks, especially the internet, to prevent remote exploitation. 2) Employ network-level access controls such as firewalls and segmentation to restrict RPC service access only to trusted hosts. 3) Disable or restrict the rpc.cmsd service if it is not essential for operations. 4) Monitor network traffic for unusual RPC activity indicative of exploitation attempts. 5) Consider migrating or upgrading legacy Solaris systems to supported, patched versions or alternative platforms to eliminate exposure. 6) Implement strict file integrity monitoring on critical system files to detect unauthorized changes promptly. 7) Enforce strong physical and administrative controls to prevent local exploitation or unauthorized access. These steps are critical to reduce the attack surface and mitigate the risk posed by this unpatched, high-severity vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7de919

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/30/2025, 5:12:11 AM

Last updated: 2/7/2026, 7:59:00 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats