Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0560: A system-critical Windows NT file or directory has inappropriate permissions.

0
High
VulnerabilityCVE-1999-0560cve-1999-0560
Published: Fri Jan 01 1999 (01/01/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_nt

Description

A system-critical Windows NT file or directory has inappropriate permissions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 06/29/2025, 00:41:26 UTC

Technical Analysis

CVE-1999-0560 identifies a critical security vulnerability in Microsoft Windows NT where a system-critical file or directory is assigned inappropriate permissions. This misconfiguration allows unauthorized users to access, modify, or delete essential system files or directories. Given the nature of Windows NT's architecture, system-critical files are integral to the operating system's stability and security. Improper permissions on these files can lead to unauthorized privilege escalation, enabling attackers to execute arbitrary code with elevated rights, compromise system integrity, or cause denial of service by corrupting or deleting vital files. The vulnerability is characterized by a CVSS score of 10.0, indicating maximum severity with network attack vector, low attack complexity, no authentication required, and complete impact on confidentiality, integrity, and availability. Despite its age and the absence of known exploits in the wild, the vulnerability remains significant for legacy systems still running Windows NT, especially in environments where these systems are connected to networks without adequate segmentation or protection. No patches are available, which suggests that mitigation relies heavily on configuration management and access control policies.

Potential Impact

For European organizations, the impact of this vulnerability is primarily on legacy systems still operating Windows NT, which may be found in industrial control systems, critical infrastructure, or specialized legacy applications. Exploitation could lead to full system compromise, data breaches, or operational disruptions. Confidentiality breaches could expose sensitive organizational or customer data, while integrity violations might corrupt critical data or system configurations. Availability impacts could result in downtime of essential services, affecting business continuity. Given the high CVSS score, the threat is severe if such systems remain in active use. Additionally, regulatory frameworks in Europe, such as GDPR, impose strict requirements on data protection; a breach resulting from this vulnerability could lead to significant legal and financial consequences. The lack of available patches increases the risk, necessitating compensating controls to prevent exploitation.

Mitigation Recommendations

Since no official patches are available for this vulnerability, European organizations should implement strict access control measures to ensure that only authorized administrators have permissions to system-critical files and directories. Conduct comprehensive audits of file and directory permissions on all Windows NT systems to identify and remediate inappropriate settings. Employ network segmentation to isolate legacy Windows NT systems from broader corporate networks and the internet, reducing exposure to remote attacks. Utilize host-based intrusion detection systems (HIDS) to monitor unauthorized changes to critical files. Where feasible, plan and execute migration strategies to modern, supported operating systems to eliminate exposure to this and other legacy vulnerabilities. Additionally, implement strict physical security controls to prevent unauthorized local access, and ensure that backup and recovery procedures are in place to restore systems in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Threat ID: 682ca32bb6fd31d6ed7dec45

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/29/2025, 12:41:26 AM

Last updated: 3/24/2026, 9:54:48 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses