Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0628: The rwho/rwhod service is running, which exposes machine status and user information.

0
Medium
VulnerabilityCVE-1999-0628cve-1999-0628
Published: Tue Jul 01 1997 (07/01/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: freebsd
Product: freebsd

Description

The rwho/rwhod service is running, which exposes machine status and user information.

AI-Powered Analysis

AILast updated: 07/01/2025, 23:41:14 UTC

Technical Analysis

CVE-1999-0628 pertains to the rwho/rwhod service running on affected FreeBSD systems. The rwho (remote who) and rwhod (remote who daemon) services are legacy Unix network services designed to share machine status and user information across a network. When active, rwhod broadcasts information about logged-in users and system status to other hosts running the service. This information includes usernames, terminal lines, login times, and machine uptime. The vulnerability arises because this data is transmitted in cleartext without authentication or encryption, allowing any network observer to intercept and collect sensitive user and system information. The CVSS score of 5.0 (medium severity) reflects that the vulnerability allows information disclosure (confidentiality impact) without affecting integrity or availability. The attack vector is network-based (AV:N), requires no authentication (Au:N), and has low complexity (AC:L). The affected versions include older FreeBSD releases (2.0.4, 4.2, 6.2) and Linux kernel 2.6.20.1, indicating this is a legacy issue. No patches are available, likely because the service is deprecated and should be disabled. There are no known exploits in the wild, but the service's presence inherently exposes sensitive information to any network adversary. This vulnerability is primarily a privacy and information disclosure risk rather than a direct system compromise vector. Modern systems typically do not run rwho/rwhod by default, but legacy or misconfigured systems may still be vulnerable. The service's exposure is especially concerning on untrusted or public networks where attackers can sniff traffic easily.

Potential Impact

For European organizations, the primary impact of this vulnerability is the unauthorized disclosure of user and system information. This can aid attackers in reconnaissance activities, enabling them to map active users, system uptime, and network topology. While it does not directly allow system compromise, the leaked information can facilitate targeted attacks such as social engineering, credential guessing, or lateral movement within a network. Organizations in sectors with strict data privacy regulations (e.g., GDPR) may face compliance risks if user information is exposed. Additionally, critical infrastructure or government entities using legacy FreeBSD systems could inadvertently reveal operational details that adversaries might exploit for further attacks. The risk is heightened in environments where network segmentation is weak or where legacy systems remain operational without proper controls. However, the lack of known exploits and the service's obsolescence reduce the likelihood of widespread exploitation. Still, the presence of this service indicates potential gaps in system hardening and patch management practices.

Mitigation Recommendations

The most effective mitigation is to disable the rwho/rwhod service entirely on all systems, especially those exposed to untrusted networks. Since no patches are available, removing or stopping the service is the only practical remediation. Network administrators should audit their environments to identify any hosts running rwho/rwhod and ensure the service is disabled and not started on boot. Additionally, network segmentation and firewall rules should block UDP port 513 (used by rwho) to prevent external access. For legacy systems that must run the service, consider isolating them on trusted internal networks with strict access controls. Monitoring network traffic for rwho broadcasts can help detect accidental exposure. Finally, organizations should review and update their system hardening policies to exclude deprecated services and ensure compliance with modern security standards.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de744

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 11:41:14 PM

Last updated: 2/7/2026, 1:57:17 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats