Skip to main content

CVE-1999-0628: The rwho/rwhod service is running, which exposes machine status and user information.

Medium
VulnerabilityCVE-1999-0628cve-1999-0628
Published: Tue Jul 01 1997 (07/01/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: freebsd
Product: freebsd

Description

The rwho/rwhod service is running, which exposes machine status and user information.

AI-Powered Analysis

AILast updated: 07/01/2025, 23:41:14 UTC

Technical Analysis

CVE-1999-0628 pertains to the rwho/rwhod service running on affected FreeBSD systems. The rwho (remote who) and rwhod (remote who daemon) services are legacy Unix network services designed to share machine status and user information across a network. When active, rwhod broadcasts information about logged-in users and system status to other hosts running the service. This information includes usernames, terminal lines, login times, and machine uptime. The vulnerability arises because this data is transmitted in cleartext without authentication or encryption, allowing any network observer to intercept and collect sensitive user and system information. The CVSS score of 5.0 (medium severity) reflects that the vulnerability allows information disclosure (confidentiality impact) without affecting integrity or availability. The attack vector is network-based (AV:N), requires no authentication (Au:N), and has low complexity (AC:L). The affected versions include older FreeBSD releases (2.0.4, 4.2, 6.2) and Linux kernel 2.6.20.1, indicating this is a legacy issue. No patches are available, likely because the service is deprecated and should be disabled. There are no known exploits in the wild, but the service's presence inherently exposes sensitive information to any network adversary. This vulnerability is primarily a privacy and information disclosure risk rather than a direct system compromise vector. Modern systems typically do not run rwho/rwhod by default, but legacy or misconfigured systems may still be vulnerable. The service's exposure is especially concerning on untrusted or public networks where attackers can sniff traffic easily.

Potential Impact

For European organizations, the primary impact of this vulnerability is the unauthorized disclosure of user and system information. This can aid attackers in reconnaissance activities, enabling them to map active users, system uptime, and network topology. While it does not directly allow system compromise, the leaked information can facilitate targeted attacks such as social engineering, credential guessing, or lateral movement within a network. Organizations in sectors with strict data privacy regulations (e.g., GDPR) may face compliance risks if user information is exposed. Additionally, critical infrastructure or government entities using legacy FreeBSD systems could inadvertently reveal operational details that adversaries might exploit for further attacks. The risk is heightened in environments where network segmentation is weak or where legacy systems remain operational without proper controls. However, the lack of known exploits and the service's obsolescence reduce the likelihood of widespread exploitation. Still, the presence of this service indicates potential gaps in system hardening and patch management practices.

Mitigation Recommendations

The most effective mitigation is to disable the rwho/rwhod service entirely on all systems, especially those exposed to untrusted networks. Since no patches are available, removing or stopping the service is the only practical remediation. Network administrators should audit their environments to identify any hosts running rwho/rwhod and ensure the service is disabled and not started on boot. Additionally, network segmentation and firewall rules should block UDP port 513 (used by rwho) to prevent external access. For legacy systems that must run the service, consider isolating them on trusted internal networks with strict access controls. Monitoring network traffic for rwho broadcasts can help detect accidental exposure. Finally, organizations should review and update their system hardening policies to exclude deprecated services and ensure compliance with modern security standards.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de744

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 11:41:14 PM

Last updated: 8/15/2025, 6:55:31 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats