Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0524: ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.

0
Low
VulnerabilityCVE-1999-0524cve-1999-0524cwe-200
Published: Fri Aug 01 1997 (08/01/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: apple
Product: mac_os_x

Description

ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.

AI-Powered Analysis

AILast updated: 07/01/2025, 23:27:57 UTC

Technical Analysis

CVE-1999-0524 is a vulnerability related to the handling of certain ICMP (Internet Control Message Protocol) information messages by affected Apple Mac OS X systems. Specifically, the vulnerability allows ICMP information requests such as netmask and timestamp queries to be accepted from arbitrary hosts without restriction. ICMP netmask requests are used to determine the subnet mask of a target host, while ICMP timestamp requests provide timing information about the target system. Allowing these requests from any source can lead to unintended information disclosure. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v2 score is 2.1, indicating a low severity level, with the vector AV:L/AC:L/Au:N/C:P/I:N/A:N, meaning the attack requires local access, low complexity, no authentication, and impacts confidentiality only, without affecting integrity or availability. No patches are available, and there are no known exploits in the wild. Given the age of this vulnerability (published in 1997) and the lack of patch availability, it is likely that modern versions of Mac OS X have addressed this issue or that it is no longer relevant in current deployments. However, in legacy or unpatched systems, this vulnerability could allow an attacker with local network access to gather network topology and timing information, which could be used for reconnaissance or to aid in further attacks.

Potential Impact

For European organizations, the impact of this vulnerability is limited due to its low severity and the requirement for local network access to exploit it. The primary risk is information disclosure, specifically network configuration details and system timing, which could assist attackers in mapping internal networks or conducting timing-based attacks. While this does not directly compromise system integrity or availability, it could facilitate more targeted attacks if combined with other vulnerabilities. Organizations with legacy Apple Mac OS X systems that are unpatched or isolated from external networks may still be at risk. However, modern network security practices, including segmentation, firewall rules, and intrusion detection, reduce the likelihood of exploitation. The vulnerability does not pose a significant threat to cloud or virtualized environments unless legacy Mac OS X systems are present.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement network-level controls to mitigate this vulnerability. Specifically, they should configure firewalls and intrusion prevention systems to block or restrict ICMP information request messages (types 1 and 13) from untrusted or external sources. Network segmentation should be enforced to limit local network access to critical Mac OS X systems. Additionally, organizations should audit their environments to identify any legacy Mac OS X systems and consider upgrading or isolating them. Monitoring network traffic for unusual ICMP activity can help detect reconnaissance attempts. Finally, educating network administrators about the risks of ICMP information requests and ensuring that security policies explicitly address ICMP traffic handling will further reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de78c

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 11:27:57 PM

Last updated: 2/7/2026, 1:57:27 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats