CVE-1999-0772: Denial of service in Compaq Management Agents and the Compaq Survey Utility via a long string sent t
Denial of service in Compaq Management Agents and the Compaq Survey Utility via a long string sent to port 2301.
AI Analysis
Technical Summary
CVE-1999-0772 is a denial of service (DoS) vulnerability affecting Compaq Management Agents and the Compaq Survey Utility, specifically version 2.0 of the Insight Management Agent product. The vulnerability arises when a specially crafted, excessively long string is sent to port 2301, which these services listen on. This input causes the affected software to crash or become unresponsive, resulting in a denial of service condition. The vulnerability requires no authentication and can be exploited remotely over the network, as indicated by the CVSS vector AV:N/AC:L/Au:N/C:P/I:N/A:P. The impact on confidentiality and integrity is limited (partial confidentiality impact, no integrity impact), but availability is significantly affected. Since the vulnerability dates back to 1999 and no patches are available, it is likely that this software is either deprecated or replaced in modern environments. However, legacy systems still running this version of Compaq Insight Management Agent remain vulnerable. The lack of known exploits in the wild suggests limited active exploitation, but the ease of triggering the DoS condition via a simple network request means opportunistic attackers could cause service disruption. The vulnerability is medium severity with a CVSS score of 6.4, reflecting the moderate impact and ease of exploitation without authentication or user interaction.
Potential Impact
For European organizations, the primary impact of this vulnerability is service disruption of systems monitored or managed by the Compaq Insight Management Agent version 2.0. This could affect IT infrastructure management, monitoring, and automated system surveys, potentially leading to downtime or degraded operational visibility. Organizations relying on legacy Compaq hardware and management tools may experience interruptions in system management workflows, impacting incident response and maintenance activities. While the vulnerability does not directly compromise data confidentiality or integrity, the denial of service could indirectly affect business continuity and operational efficiency. Critical infrastructure or data centers using legacy Compaq management agents could be targeted to cause temporary outages. Given the age of the vulnerability, most modern European enterprises are unlikely to be affected unless they maintain legacy systems without upgrades or replacements.
Mitigation Recommendations
Since no patches are available for this vulnerability, European organizations should focus on compensating controls. First, identify and inventory any legacy Compaq Insight Management Agent installations, especially version 2.0, within their networks. If found, isolate these systems from untrusted networks or restrict access to port 2301 using network segmentation and firewall rules to prevent unauthorized external access. Employ intrusion detection or prevention systems (IDS/IPS) to monitor and block suspicious traffic targeting port 2301. Consider upgrading or replacing legacy Compaq management tools with modern, supported alternatives to eliminate exposure. Additionally, implement network-level rate limiting and anomaly detection to identify and mitigate potential DoS attempts. Regularly review and update asset management to avoid unknown legacy systems remaining in production environments. Finally, maintain robust incident response plans to quickly address any service disruptions caused by exploitation attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy
CVE-1999-0772: Denial of service in Compaq Management Agents and the Compaq Survey Utility via a long string sent t
Description
Denial of service in Compaq Management Agents and the Compaq Survey Utility via a long string sent to port 2301.
AI-Powered Analysis
Technical Analysis
CVE-1999-0772 is a denial of service (DoS) vulnerability affecting Compaq Management Agents and the Compaq Survey Utility, specifically version 2.0 of the Insight Management Agent product. The vulnerability arises when a specially crafted, excessively long string is sent to port 2301, which these services listen on. This input causes the affected software to crash or become unresponsive, resulting in a denial of service condition. The vulnerability requires no authentication and can be exploited remotely over the network, as indicated by the CVSS vector AV:N/AC:L/Au:N/C:P/I:N/A:P. The impact on confidentiality and integrity is limited (partial confidentiality impact, no integrity impact), but availability is significantly affected. Since the vulnerability dates back to 1999 and no patches are available, it is likely that this software is either deprecated or replaced in modern environments. However, legacy systems still running this version of Compaq Insight Management Agent remain vulnerable. The lack of known exploits in the wild suggests limited active exploitation, but the ease of triggering the DoS condition via a simple network request means opportunistic attackers could cause service disruption. The vulnerability is medium severity with a CVSS score of 6.4, reflecting the moderate impact and ease of exploitation without authentication or user interaction.
Potential Impact
For European organizations, the primary impact of this vulnerability is service disruption of systems monitored or managed by the Compaq Insight Management Agent version 2.0. This could affect IT infrastructure management, monitoring, and automated system surveys, potentially leading to downtime or degraded operational visibility. Organizations relying on legacy Compaq hardware and management tools may experience interruptions in system management workflows, impacting incident response and maintenance activities. While the vulnerability does not directly compromise data confidentiality or integrity, the denial of service could indirectly affect business continuity and operational efficiency. Critical infrastructure or data centers using legacy Compaq management agents could be targeted to cause temporary outages. Given the age of the vulnerability, most modern European enterprises are unlikely to be affected unless they maintain legacy systems without upgrades or replacements.
Mitigation Recommendations
Since no patches are available for this vulnerability, European organizations should focus on compensating controls. First, identify and inventory any legacy Compaq Insight Management Agent installations, especially version 2.0, within their networks. If found, isolate these systems from untrusted networks or restrict access to port 2301 using network segmentation and firewall rules to prevent unauthorized external access. Employ intrusion detection or prevention systems (IDS/IPS) to monitor and block suspicious traffic targeting port 2301. Consider upgrading or replacing legacy Compaq management tools with modern, supported alternatives to eliminate exposure. Additionally, implement network-level rate limiting and anomaly detection to identify and mitigate potential DoS attempts. Regularly review and update asset management to avoid unknown legacy systems remaining in production environments. Finally, maintain robust incident response plans to quickly address any service disruptions caused by exploitation attempts.
Affected Countries
Threat ID: 682ca32cb6fd31d6ed7df044
Added to database: 5/20/2025, 3:43:40 PM
Last enriched: 7/1/2025, 5:25:33 PM
Last updated: 2/7/2026, 3:06:33 AM
Views: 31
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2069: Stack-based Buffer Overflow in ggml-org llama.cpp
MediumCVE-2026-25760: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in BishopFox sliver
MediumCVE-2026-25574: CWE-639: Authorization Bypass Through User-Controlled Key in payloadcms payload
MediumCVE-2026-25516: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
MediumCVE-2026-25581: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in samclarke SCEditor
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.