Skip to main content

CVE-1999-0355: Local or remote users can force ControlIT 4.5 to reboot or force a user to log out, resulting in a d

Medium
VulnerabilityCVE-1999-0355cve-1999-0355rcedenial of service
Published: Fri Jan 01 1999 (01/01/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: broadcom
Product: controlit

Description

Local or remote users can force ControlIT 4.5 to reboot or force a user to log out, resulting in a denial of service.

AI-Powered Analysis

AILast updated: 07/01/2025, 21:10:59 UTC

Technical Analysis

CVE-1999-0355 is a vulnerability affecting Broadcom's ControlIT version 4.5, where local or remote users can trigger a forced reboot of the system or cause a user to be forcibly logged out. This results in a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but directly affects availability by disrupting normal operations. The CVSS score of 5.0 (medium severity) reflects that the attack vector is network-based (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L). The vulnerability allows an attacker to cause service interruptions remotely without needing user interaction or credentials. ControlIT is a management or control software product by Broadcom, and version 4.5 is specifically affected. There is no patch available, and no known exploits have been reported in the wild. The vulnerability dates back to 1999, indicating it is an old issue, but it may still be relevant in legacy environments. The tags include remote code execution (rce) and denial of service; however, the description and CVSS vector indicate the primary impact is denial of service rather than code execution. The lack of patches means organizations must rely on mitigating controls or upgrade paths if available. The vulnerability could be exploited by attackers to disrupt critical services managed by ControlIT, causing operational downtime and potential cascading effects in dependent systems.

Potential Impact

For European organizations using ControlIT 4.5, this vulnerability poses a risk primarily to system availability. Disruption through forced reboots or user logouts can lead to operational downtime, impacting business continuity, especially in environments where ControlIT manages critical infrastructure or network devices. The denial of service could affect IT service management, network operations, or other automated control processes, potentially delaying incident response or maintenance tasks. While the vulnerability does not compromise data confidentiality or integrity, the operational impact could be significant in sectors such as telecommunications, utilities, or large enterprises relying on Broadcom's management tools. Given the age of the vulnerability, it is more likely to affect organizations running legacy systems or those that have not updated their management software. The absence of known exploits reduces immediate risk, but the ease of exploitation and lack of authentication requirements mean that opportunistic attackers could still leverage this vulnerability if the affected software is exposed to untrusted networks.

Mitigation Recommendations

Since no patch is available for ControlIT 4.5, European organizations should consider the following specific mitigations: 1) Isolate ControlIT management interfaces from untrusted networks by implementing strict network segmentation and access controls, limiting exposure to only trusted administrators and systems. 2) Employ firewall rules and intrusion prevention systems (IPS) to detect and block suspicious traffic targeting ControlIT services. 3) Monitor logs and system behavior for unusual reboot or logout events that could indicate exploitation attempts. 4) Where possible, upgrade to a newer, supported version of ControlIT or migrate to alternative management solutions that do not have this vulnerability. 5) Implement multi-factor authentication and strong access policies around management interfaces to reduce risk, even though this vulnerability does not require authentication, to improve overall security posture. 6) Conduct regular security assessments and penetration testing focused on legacy management tools to identify and remediate similar risks.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7debdc

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 9:10:59 PM

Last updated: 7/26/2025, 4:44:57 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats