Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0379: Microsoft Taskpads allows remote web sites to execute commands on the visiting user's machine via ce

0
High
VulnerabilityCVE-1999-0379cve-1999-0379
Published: Mon Feb 22 1999 (02/22/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: backoffice_resource_kit

Description

Microsoft Taskpads allows remote web sites to execute commands on the visiting user's machine via certain methods that are marked as Safe for Scripting.

AI-Powered Analysis

AILast updated: 06/28/2025, 08:26:44 UTC

Technical Analysis

CVE-1999-0379 is a high-severity vulnerability affecting Microsoft Taskpads, specifically the BackOffice Resource Kit version 2.0. The vulnerability arises because certain methods within Taskpads are marked as "Safe for Scripting," which allows remote websites to execute arbitrary commands on the visiting user's machine without requiring authentication. This occurs when a user visits a malicious web page that leverages these scripting methods to run commands, potentially leading to full compromise of the affected system. The vulnerability is network exploitable (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L). The impact spans confidentiality, integrity, and availability, as attackers can execute commands remotely, potentially stealing data, modifying system configurations, or disrupting services. Although this vulnerability dates back to 1999 and targets an older Microsoft product, it remains relevant in legacy environments where BackOffice Resource Kit 2.0 is still in use. Microsoft has released patches to address this issue, as documented in security bulletin MS99-007. No known exploits in the wild have been reported, but the ease of exploitation and high impact make it a significant threat if unpatched.

Potential Impact

For European organizations, the impact of CVE-1999-0379 can be substantial in environments where legacy Microsoft BackOffice Resource Kit 2.0 is still deployed, such as in industrial control systems, government agencies, or enterprises with outdated infrastructure. Exploitation could lead to unauthorized command execution, enabling attackers to exfiltrate sensitive data, disrupt critical business operations, or establish persistent footholds within networks. Given the vulnerability's ability to compromise confidentiality, integrity, and availability, organizations could face data breaches, operational downtime, and reputational damage. Additionally, since the vulnerability allows remote code execution without authentication, it increases the risk of automated or widespread attacks if exposed to the internet. European organizations with strict data protection regulations (e.g., GDPR) may also face legal and compliance consequences if this vulnerability leads to data exposure.

Mitigation Recommendations

1. Immediate application of the official Microsoft patch provided in security bulletin MS99-007 to all affected systems running BackOffice Resource Kit 2.0. 2. Conduct a thorough inventory to identify any legacy systems still using this software and prioritize their remediation or decommissioning. 3. Implement network segmentation to isolate legacy systems from the internet and critical internal networks, minimizing exposure. 4. Employ web filtering and intrusion prevention systems to block access to known malicious websites that could exploit this vulnerability. 5. Monitor network traffic and system logs for unusual command execution patterns or signs of compromise related to Taskpads. 6. Educate users about the risks of visiting untrusted websites, especially when using legacy systems. 7. Consider migrating to supported, updated software solutions to eliminate reliance on vulnerable legacy components.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7dee6d

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/28/2025, 8:26:44 AM

Last updated: 2/7/2026, 8:58:40 PM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats