Skip to main content

CVE-1999-0383: ACC Tigris allows public access without a login.

High
VulnerabilityCVE-1999-0383cve-1999-0383
Published: Tue Feb 02 1999 (02/02/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: acc
Product: tigris

Description

ACC Tigris allows public access without a login.

AI-Powered Analysis

AILast updated: 06/28/2025, 11:10:39 UTC

Technical Analysis

CVE-1999-0383 is a high-severity vulnerability affecting ACC Tigris version 10.5.8, where the application allows public access without requiring any login or authentication. This means that any user on the network or internet can access the system's resources and functionalities without credentials. The vulnerability is characterized by a lack of access control mechanisms, effectively exposing potentially sensitive data and system functions to unauthorized users. The CVSS score of 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P) indicates that the vulnerability is remotely exploitable over the network with low attack complexity and no authentication required, and it impacts confidentiality, integrity, and availability. Since no patch is available, the vulnerability remains unmitigated by vendor fixes, increasing the risk for affected deployments. Although there are no known exploits in the wild, the simplicity of exploitation and the broad impact make this a critical security concern. ACC Tigris is a product used in specific enterprise environments, and the vulnerability essentially means that attackers can gain unauthorized access, potentially leading to data leakage, unauthorized data modification, or service disruption.

Potential Impact

For European organizations using ACC Tigris 10.5.8, this vulnerability poses a significant risk. Unauthorized public access can lead to exposure of confidential business data, intellectual property, or personal data protected under GDPR, resulting in compliance violations and potential fines. Integrity of data can be compromised, allowing attackers to alter or corrupt critical information, which may disrupt business operations or lead to incorrect decision-making. Availability may also be affected if attackers exploit the system to disrupt services or launch denial-of-service conditions. Given the lack of authentication, attackers do not need valid credentials, making insider threats less relevant and increasing the risk from external attackers. The absence of patches means organizations must rely on compensating controls. The impact is particularly severe for sectors with sensitive data such as finance, healthcare, and government entities within Europe, where data protection regulations are strict and reputational damage can be substantial.

Mitigation Recommendations

Since no official patch is available for this vulnerability, European organizations should implement strict network-level access controls to restrict access to ACC Tigris systems. This includes placing the affected systems behind firewalls and VPNs, limiting access to trusted IP addresses only. Organizations should also consider network segmentation to isolate ACC Tigris servers from the broader corporate network and internet. Implementing strong monitoring and logging to detect any unauthorized access attempts is critical. If possible, disable or restrict any public-facing interfaces of ACC Tigris until a patch or upgrade is available. Additionally, organizations should evaluate alternative products or versions that do not have this vulnerability. Regular security assessments and penetration testing should be conducted to ensure no unauthorized access is possible. Finally, organizations must ensure that sensitive data stored or processed by ACC Tigris is encrypted and backed up securely to mitigate the impact of potential data breaches or tampering.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7deded

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/28/2025, 11:10:39 AM

Last updated: 8/6/2025, 12:20:59 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats