Skip to main content

CVE-1999-0728: A Windows NT user can disable the keyboard or mouse by directly calling the IOCTLs which control the

High
VulnerabilityCVE-1999-0728cve-1999-0728cwe-264
Published: Tue Jul 06 1999 (07/06/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_nt

Description

A Windows NT user can disable the keyboard or mouse by directly calling the IOCTLs which control them.

AI-Powered Analysis

AILast updated: 06/27/2025, 19:55:15 UTC

Technical Analysis

CVE-1999-0728 is a high-severity vulnerability affecting Microsoft Windows NT 4.0, where a local user can disable the keyboard or mouse by directly invoking the Input/Output Control (IOCTL) commands that manage these input devices. IOCTLs are system calls used by device drivers to communicate with hardware devices. In this case, the vulnerability arises because the operating system does not properly restrict access to these IOCTL interfaces, allowing any user with local access to send commands that can disable critical input peripherals. This results in a denial of service (DoS) condition, as the affected user or system administrator loses the ability to interact with the system via keyboard or mouse. The vulnerability does not impact confidentiality or integrity directly but severely impacts availability. The CVSS score of 7.8 (high) reflects the network attack vector (AV:N), low attack complexity (AC:L), no authentication required (Au:N), and impact limited to availability (A:C). Although exploitation requires local access, no user interaction is needed beyond executing the IOCTL calls. Microsoft has released a patch to address this issue (MS99-024), which restricts access to these IOCTL calls to prevent unauthorized disabling of input devices. There are no known exploits in the wild, likely due to the age of the vulnerability and the requirement for local access. However, legacy systems running Windows NT 4.0 remain vulnerable if unpatched. This vulnerability is categorized under CWE-264 (Permissions, Privileges, and Access Controls), indicating improper access control to sensitive device interfaces.

Potential Impact

For European organizations, the primary impact of this vulnerability is a local denial of service on affected Windows NT 4.0 systems. While Windows NT 4.0 is an outdated operating system, some industrial control systems, legacy applications, or specialized environments may still run it. Disabling keyboard or mouse input could halt operations, delay critical processes, or require physical intervention to restore functionality. This could be particularly disruptive in environments where remote access is limited or where physical access is restricted. Although the vulnerability does not allow data theft or system compromise, the loss of input devices can lead to operational downtime and increased support costs. In sectors such as manufacturing, utilities, or transportation within Europe, where legacy systems might still be in use, this vulnerability could impact availability and operational continuity. Additionally, organizations with strict compliance requirements may face challenges if legacy systems remain unpatched. However, the overall risk is mitigated by the obsolescence of Windows NT 4.0 and the availability of patches.

Mitigation Recommendations

1. Apply the official Microsoft patch MS99-024 immediately on all Windows NT 4.0 systems to restrict unauthorized IOCTL access. 2. Where possible, upgrade legacy Windows NT 4.0 systems to supported and modern operating systems to eliminate exposure to this and other legacy vulnerabilities. 3. Implement strict local access controls and physical security measures to prevent unauthorized users from gaining local access to vulnerable systems. 4. Use endpoint security solutions that can monitor and restrict unauthorized IOCTL calls or suspicious device driver interactions. 5. For environments where upgrading is not feasible, consider isolating legacy systems from general network access and restrict administrative access to trusted personnel only. 6. Regularly audit and inventory legacy systems to identify unpatched or vulnerable devices. 7. Establish incident response procedures to quickly recover from input device denial of service scenarios, including availability of alternative input methods or remote management tools.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df0d3

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 7:55:15 PM

Last updated: 8/19/2025, 11:11:39 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats