Skip to main content

CVE-1999-0664: An application-critical Windows NT registry key has inappropriate permissions.

High
VulnerabilityCVE-1999-0664cve-1999-0664
Published: Fri Jan 01 1999 (01/01/1999, 05:00:00 UTC)
Source: NVD

Description

An application-critical Windows NT registry key has inappropriate permissions.

AI-Powered Analysis

AILast updated: 06/28/2025, 17:41:06 UTC

Technical Analysis

CVE-1999-0664 identifies a critical security vulnerability in Windows NT where an application-critical registry key is configured with inappropriate permissions. The Windows registry is a hierarchical database that stores low-level settings for the operating system and for applications. Improper permissions on critical registry keys can allow unauthorized users or processes to read, modify, or delete sensitive configuration data. This vulnerability is particularly severe because it affects a core component of the Windows NT operating system, potentially allowing an attacker to escalate privileges, execute arbitrary code, or disrupt system stability. The CVSS score of 10 (critical) reflects the vulnerability's high impact on confidentiality, integrity, and availability, combined with its ease of exploitation (network attack vector, no authentication required, and no user interaction needed). Although this vulnerability dates back to 1999 and affects legacy Windows NT systems, it remains relevant for organizations still operating such environments or similar configurations. The lack of an available patch increases the risk, as organizations must rely on compensating controls to mitigate potential exploitation. The vulnerability's exploitation could lead to full system compromise, data breaches, and denial of service, severely impacting organizational operations.

Potential Impact

For European organizations, the impact of CVE-1999-0664 can be significant, especially for those maintaining legacy Windows NT systems in industrial control environments, critical infrastructure, or specialized legacy applications. Exploitation could lead to unauthorized access to sensitive data, disruption of business-critical services, and potential lateral movement within networks. Given the vulnerability allows for full compromise without authentication, attackers could leverage it to establish persistent footholds or launch further attacks. This is particularly concerning for sectors such as finance, healthcare, energy, and government agencies, where data confidentiality and system availability are paramount. Additionally, compliance with European data protection regulations (e.g., GDPR) could be jeopardized if this vulnerability leads to data breaches. The absence of patches necessitates heightened vigilance and alternative mitigation strategies to protect these systems.

Mitigation Recommendations

Since no official patch is available for this vulnerability, European organizations should implement the following specific mitigation measures: 1) Conduct a thorough audit of registry permissions on all Windows NT systems to identify and correct overly permissive access controls on critical registry keys. 2) Employ the principle of least privilege by restricting user and service account permissions to the minimum necessary, especially on legacy systems. 3) Isolate legacy Windows NT systems from the broader corporate network using network segmentation and firewalls to limit exposure. 4) Monitor systems for unusual registry modifications or suspicious activities using host-based intrusion detection systems (HIDS) and centralized logging. 5) Where possible, plan and execute migration away from unsupported Windows NT systems to modern, supported Windows versions with active security updates. 6) Implement strict access controls and multi-factor authentication on administrative accounts to reduce the risk of unauthorized privilege escalation. 7) Regularly back up critical system configurations and registry hives to enable recovery in case of compromise.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7ded3d

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/28/2025, 5:41:06 PM

Last updated: 8/12/2025, 10:01:43 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats