Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0351: FTP PASV "Pizza Thief" denial of service and unauthorized data access. Attackers can steal data by

0
Medium
VulnerabilityCVE-1999-0351cve-1999-0351denial of service
Published: Mon Feb 01 1999 (02/01/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: ftp
Product: ftp_pasv

Description

FTP PASV "Pizza Thief" denial of service and unauthorized data access. Attackers can steal data by connecting to a port that was intended for use by a client.

AI-Powered Analysis

AILast updated: 07/01/2025, 19:56:43 UTC

Technical Analysis

CVE-1999-0351, known as the FTP PASV "Pizza Thief" vulnerability, is a security flaw affecting the FTP protocol's passive mode (PASV) implementation. In FTP passive mode, the server opens a random port and informs the client to connect to it for data transfer. This vulnerability arises because attackers can connect to these server-assigned ports intended for legitimate clients, allowing them to intercept or steal data being transferred. Additionally, the flaw can be exploited to cause a denial of service (DoS) by disrupting legitimate data connections. The vulnerability does not require authentication and can be exploited remotely over the network, with low attack complexity. The CVSS score of 6.4 reflects a medium severity, indicating partial confidentiality impact (data theft possible) and availability impact (denial of service), but no integrity impact. Since this vulnerability dates back to 1999 and affects the FTP protocol's PASV mode, it primarily concerns legacy FTP servers or systems still relying on FTP for file transfers. No patches are available, and no known exploits are currently active in the wild, but the fundamental protocol design flaw remains a risk if FTP PASV mode is used without additional protections.

Potential Impact

For European organizations, the impact of this vulnerability depends on the extent to which FTP PASV mode is used in their infrastructure. Organizations relying on legacy FTP servers for file transfers, especially those transferring sensitive or regulated data, face risks of unauthorized data disclosure and service disruption. Confidentiality is at risk because attackers can potentially intercept data by connecting to the PASV ports. Availability can also be affected due to denial of service attacks disrupting legitimate FTP sessions. This can impact sectors such as finance, healthcare, manufacturing, and government agencies that may still use FTP for legacy systems or inter-organizational data exchange. The risk is heightened in environments lacking network segmentation or encrypted tunnels (e.g., VPNs or TLS) protecting FTP traffic. Given the absence of patches, organizations must consider alternative secure file transfer protocols or implement compensating controls to mitigate exposure.

Mitigation Recommendations

1. Transition away from FTP PASV mode to more secure file transfer protocols such as SFTP (SSH File Transfer Protocol) or FTPS (FTP over TLS), which provide encryption and better authentication mechanisms. 2. If FTP PASV must be used, restrict access to FTP servers using firewalls and network segmentation to limit exposure to trusted clients only. 3. Employ VPNs or encrypted tunnels to protect FTP traffic from interception. 4. Monitor network traffic for unusual connections to PASV ports that could indicate exploitation attempts. 5. Disable PASV mode if possible and use active mode with appropriate firewall configurations, although active mode has its own challenges. 6. Regularly audit and update legacy systems to minimize reliance on outdated protocols. 7. Educate network and security teams about the risks associated with FTP PASV and ensure logging is enabled to detect suspicious activities.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7dedd4

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 7:56:43 PM

Last updated: 2/7/2026, 6:55:21 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats