Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0432: ftp on HP-UX 11.00 allows local users to gain privileges.

0
Medium
VulnerabilityCVE-1999-0432cve-1999-0432
Published: Mon Mar 01 1999 (03/01/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: hp
Product: hp-ux

Description

ftp on HP-UX 11.00 allows local users to gain privileges.

AI-Powered Analysis

AILast updated: 07/01/2025, 19:25:19 UTC

Technical Analysis

CVE-1999-0432 is a vulnerability affecting the ftp service on HP-UX version 11.00, an operating system developed by Hewlett-Packard. The vulnerability allows local users to escalate their privileges on the affected system. Specifically, a local user with access to the system can exploit this flaw in the ftp service to gain higher privileges, potentially root-level access. The vulnerability is characterized by its local attack vector (AV:L), low attack complexity (AC:L), no authentication required (Au:N), and impacts on confidentiality, integrity, and availability (all marked as partial). Since the vulnerability dates back to 1999 and affects an older version of HP-UX, it is primarily relevant to legacy systems still running this version. No patch is available for this vulnerability, and there are no known exploits in the wild. The lack of a patch means that affected systems remain vulnerable unless mitigated through other means such as disabling the vulnerable ftp service or restricting local user access. The ftp service is known for its inherent security weaknesses, and this vulnerability further exacerbates the risk by allowing privilege escalation from a local user context.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the presence of HP-UX 11.00 systems within their infrastructure. Organizations that still operate legacy HP-UX 11.00 servers, especially those providing ftp services, are at risk of local privilege escalation attacks. This could lead to unauthorized access to sensitive data, modification or deletion of critical files, and potential disruption of services. The compromise of privileged accounts could also facilitate further lateral movement within the network, increasing the overall risk posture. Given the age of the vulnerability and the lack of patches, organizations relying on these legacy systems face a persistent risk. In sectors such as manufacturing, telecommunications, or government agencies where HP-UX systems may still be in use, the impact could be significant, especially if these systems handle sensitive or regulated data. However, the requirement for local access limits the threat to insiders or attackers who have already gained some foothold in the environment.

Mitigation Recommendations

Since no official patch is available for CVE-1999-0432, European organizations should implement compensating controls to mitigate the risk. These include: 1) Disabling the ftp service on HP-UX 11.00 systems if it is not strictly necessary, or replacing it with more secure file transfer protocols such as SFTP or SCP. 2) Restricting local user access to only trusted personnel and enforcing strict access controls and monitoring on systems running HP-UX 11.00. 3) Employing host-based intrusion detection systems (HIDS) to monitor for unusual privilege escalation attempts or suspicious ftp activity. 4) Isolating legacy HP-UX systems from critical network segments to limit potential lateral movement. 5) Considering upgrading or migrating from HP-UX 11.00 to a supported and patched operating system version to eliminate the vulnerability entirely. 6) Conducting regular audits of user accounts and permissions on these systems to detect and remove unnecessary privileges. These targeted mitigations go beyond generic advice by focusing on the specific constraints and characteristics of this vulnerability and the affected environment.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7deeab

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 7:25:19 PM

Last updated: 2/7/2026, 7:41:41 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats