CVE-1999-0628: The rwho/rwhod service is running, which exposes machine status and user information.
The rwho/rwhod service is running, which exposes machine status and user information.
AI Analysis
Technical Summary
CVE-1999-0628 pertains to the rwho/rwhod service running on affected FreeBSD systems. The rwho (remote who) and rwhod (remote who daemon) services are legacy Unix network services designed to share machine status and user information across a network. When active, rwhod broadcasts information about logged-in users and system status to other hosts running the service. This information includes usernames, terminal lines, login times, and machine uptime. The vulnerability arises because this data is transmitted in cleartext without authentication or encryption, allowing any network observer to intercept and collect sensitive user and system information. The CVSS score of 5.0 (medium severity) reflects that the vulnerability allows information disclosure (confidentiality impact) without affecting integrity or availability. The attack vector is network-based (AV:N), requires no authentication (Au:N), and has low complexity (AC:L). The affected versions include older FreeBSD releases (2.0.4, 4.2, 6.2) and Linux kernel 2.6.20.1, indicating this is a legacy issue. No patches are available, likely because the service is deprecated and should be disabled. There are no known exploits in the wild, but the service's presence inherently exposes sensitive information to any network adversary. This vulnerability is primarily a privacy and information disclosure risk rather than a direct system compromise vector. Modern systems typically do not run rwho/rwhod by default, but legacy or misconfigured systems may still be vulnerable. The service's exposure is especially concerning on untrusted or public networks where attackers can sniff traffic easily.
Potential Impact
For European organizations, the primary impact of this vulnerability is the unauthorized disclosure of user and system information. This can aid attackers in reconnaissance activities, enabling them to map active users, system uptime, and network topology. While it does not directly allow system compromise, the leaked information can facilitate targeted attacks such as social engineering, credential guessing, or lateral movement within a network. Organizations in sectors with strict data privacy regulations (e.g., GDPR) may face compliance risks if user information is exposed. Additionally, critical infrastructure or government entities using legacy FreeBSD systems could inadvertently reveal operational details that adversaries might exploit for further attacks. The risk is heightened in environments where network segmentation is weak or where legacy systems remain operational without proper controls. However, the lack of known exploits and the service's obsolescence reduce the likelihood of widespread exploitation. Still, the presence of this service indicates potential gaps in system hardening and patch management practices.
Mitigation Recommendations
The most effective mitigation is to disable the rwho/rwhod service entirely on all systems, especially those exposed to untrusted networks. Since no patches are available, removing or stopping the service is the only practical remediation. Network administrators should audit their environments to identify any hosts running rwho/rwhod and ensure the service is disabled and not started on boot. Additionally, network segmentation and firewall rules should block UDP port 513 (used by rwho) to prevent external access. For legacy systems that must run the service, consider isolating them on trusted internal networks with strict access controls. Monitoring network traffic for rwho broadcasts can help detect accidental exposure. Finally, organizations should review and update their system hardening policies to exclude deprecated services and ensure compliance with modern security standards.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Finland
CVE-1999-0628: The rwho/rwhod service is running, which exposes machine status and user information.
Description
The rwho/rwhod service is running, which exposes machine status and user information.
AI-Powered Analysis
Technical Analysis
CVE-1999-0628 pertains to the rwho/rwhod service running on affected FreeBSD systems. The rwho (remote who) and rwhod (remote who daemon) services are legacy Unix network services designed to share machine status and user information across a network. When active, rwhod broadcasts information about logged-in users and system status to other hosts running the service. This information includes usernames, terminal lines, login times, and machine uptime. The vulnerability arises because this data is transmitted in cleartext without authentication or encryption, allowing any network observer to intercept and collect sensitive user and system information. The CVSS score of 5.0 (medium severity) reflects that the vulnerability allows information disclosure (confidentiality impact) without affecting integrity or availability. The attack vector is network-based (AV:N), requires no authentication (Au:N), and has low complexity (AC:L). The affected versions include older FreeBSD releases (2.0.4, 4.2, 6.2) and Linux kernel 2.6.20.1, indicating this is a legacy issue. No patches are available, likely because the service is deprecated and should be disabled. There are no known exploits in the wild, but the service's presence inherently exposes sensitive information to any network adversary. This vulnerability is primarily a privacy and information disclosure risk rather than a direct system compromise vector. Modern systems typically do not run rwho/rwhod by default, but legacy or misconfigured systems may still be vulnerable. The service's exposure is especially concerning on untrusted or public networks where attackers can sniff traffic easily.
Potential Impact
For European organizations, the primary impact of this vulnerability is the unauthorized disclosure of user and system information. This can aid attackers in reconnaissance activities, enabling them to map active users, system uptime, and network topology. While it does not directly allow system compromise, the leaked information can facilitate targeted attacks such as social engineering, credential guessing, or lateral movement within a network. Organizations in sectors with strict data privacy regulations (e.g., GDPR) may face compliance risks if user information is exposed. Additionally, critical infrastructure or government entities using legacy FreeBSD systems could inadvertently reveal operational details that adversaries might exploit for further attacks. The risk is heightened in environments where network segmentation is weak or where legacy systems remain operational without proper controls. However, the lack of known exploits and the service's obsolescence reduce the likelihood of widespread exploitation. Still, the presence of this service indicates potential gaps in system hardening and patch management practices.
Mitigation Recommendations
The most effective mitigation is to disable the rwho/rwhod service entirely on all systems, especially those exposed to untrusted networks. Since no patches are available, removing or stopping the service is the only practical remediation. Network administrators should audit their environments to identify any hosts running rwho/rwhod and ensure the service is disabled and not started on boot. Additionally, network segmentation and firewall rules should block UDP port 513 (used by rwho) to prevent external access. For legacy systems that must run the service, consider isolating them on trusted internal networks with strict access controls. Monitoring network traffic for rwho broadcasts can help detect accidental exposure. Finally, organizations should review and update their system hardening policies to exclude deprecated services and ensure compliance with modern security standards.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32ab6fd31d6ed7de744
Added to database: 5/20/2025, 3:43:38 PM
Last enriched: 7/1/2025, 11:41:14 PM
Last updated: 8/15/2025, 6:55:31 PM
Views: 10
Related Threats
CVE-2025-8464: CWE-23 Relative Path Traversal in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
MediumCVE-2025-7499: CWE-862 Missing Authorization in wpdevteam BetterDocs – Advanced AI-Driven Documentation, FAQ & Knowledge Base Tool for Elementor & Gutenberg with Encyclopedia, AI Support, Instant Answers
MediumCVE-2025-8896: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in cozmoslabs User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor
MediumCVE-2025-8089: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in mdempfle Advanced iFrame
MediumCVE-2025-8113: CWE-79 Cross-Site Scripting (XSS) in Ebook Store
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.