Skip to main content

CVE-1999-0651: The rsh/rlogin service is running.

High
VulnerabilityCVE-1999-0651cve-1999-0651
Published: Fri Jan 01 1999 (01/01/1999, 05:00:00 UTC)
Source: NVD

Description

The rsh/rlogin service is running.

AI-Powered Analysis

AILast updated: 06/28/2025, 18:55:19 UTC

Technical Analysis

CVE-1999-0651 identifies the presence of the rsh (remote shell) and rlogin (remote login) services running on a system. These services were designed to allow users to execute commands and log into remote systems over a network without requiring strong authentication or encryption. Both rsh and rlogin rely on trust relationships and transmit data, including credentials, in plaintext, making them inherently insecure by modern standards. The vulnerability itself is the continued use or exposure of these services, which can be exploited by attackers to intercept sensitive information, perform unauthorized remote command execution, and potentially gain full control over affected systems. The CVSS score of 7.5 (high) reflects the network attack vector (AV:N), low attack complexity (AC:L), no authentication required (Au:N), and impacts on confidentiality, integrity, and availability (C:P/I:P/A:P). Since these services do not require authentication and transmit data unencrypted, attackers can easily perform man-in-the-middle attacks or spoof trusted hosts to gain unauthorized access. Although no patches exist because this is a design flaw and deprecated service, the presence of these services on modern networks represents a significant security risk.

Potential Impact

For European organizations, the presence of rsh/rlogin services can lead to severe security breaches. Attackers can intercept sensitive credentials and data transmitted over the network, leading to unauthorized access to critical systems. This can compromise confidentiality of sensitive business information, integrity of system configurations and data, and availability of services if attackers execute malicious commands or disrupt operations. European organizations in sectors such as finance, government, healthcare, and critical infrastructure are particularly at risk due to the sensitive nature of their data and regulatory requirements like GDPR. The use of these legacy services can also lead to non-compliance with security standards and audits, resulting in legal and reputational damage. Furthermore, the ease of exploitation means that even less sophisticated attackers can leverage this vulnerability to gain footholds in networks, potentially leading to lateral movement and broader compromise.

Mitigation Recommendations

Given that no patches exist for the inherent insecurity of rsh/rlogin, the primary mitigation is to completely disable these services on all systems. Organizations should audit their networks to identify any hosts running rsh or rlogin daemons and remove or disable them immediately. Replace these services with secure alternatives such as SSH (Secure Shell), which provides encrypted communication and strong authentication mechanisms. Network segmentation and firewall rules should be implemented to block traffic on ports associated with rsh (TCP 514) and rlogin (TCP 513). Additionally, organizations should conduct regular vulnerability scans and penetration tests to ensure no legacy services remain active. Employee training and awareness programs should emphasize the risks of legacy protocols and the importance of using secure remote access methods. Monitoring network traffic for unusual activity related to these ports can also help detect attempts to exploit these services.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7ded18

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/28/2025, 6:55:19 PM

Last updated: 8/4/2025, 4:56:24 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats