Skip to main content

CVE-1999-0792: ROUTERmate has a default SNMP community name which allows remote attackers to modify its configurati

Medium
VulnerabilityCVE-1999-0792cve-1999-0792
Published: Tue Sep 01 1998 (09/01/1998, 04:00:00 UTC)
Source: NVD
Vendor/Project: osicom
Product: routermate

Description

ROUTERmate has a default SNMP community name which allows remote attackers to modify its configuration.

AI-Powered Analysis

AILast updated: 07/01/2025, 21:41:45 UTC

Technical Analysis

CVE-1999-0792 identifies a vulnerability in ROUTERmate, a network device produced by Osicom, where the device uses a default SNMP (Simple Network Management Protocol) community name that is well-known and unchanged by default. SNMP community names function as passwords that control access to the device's management interface. In this case, the default community name allows remote attackers to connect to the device's SNMP service without authentication and modify its configuration settings. Since SNMP is commonly used for network device management, unauthorized modification can lead to disruption of network operations or redirection of traffic. The vulnerability is characterized by a CVSS base score of 5.0 (medium severity), with the vector AV:N/AC:L/Au:N/C:N/I:N/A:P, indicating that the attack can be performed remotely over the network with low attack complexity, no authentication required, no impact on confidentiality or integrity, but with an impact on availability. The vulnerability dates back to 1998, and no patches or fixes are available, likely due to the age and obsolescence of the product. There are no known exploits in the wild currently documented. The root cause is the failure to change or disable the default SNMP community string, which is a common security misconfiguration in network devices, especially older ones.

Potential Impact

For European organizations, the impact of this vulnerability depends on the presence and use of ROUTERmate devices within their network infrastructure. If such devices are still operational, attackers could remotely modify router configurations, potentially causing network outages or degraded service availability. This could disrupt business operations, especially for organizations relying on continuous network connectivity. Although the vulnerability does not directly compromise confidentiality or integrity, the availability impact could lead to denial of service conditions or misrouting of traffic, which in turn could indirectly affect data flows and operational integrity. Given the age of the vulnerability and the lack of patches, affected organizations may face challenges in remediation if devices are still in use. Additionally, the vulnerability could be leveraged as part of a larger attack chain targeting network infrastructure. European organizations with legacy network equipment or insufficient network segmentation are at higher risk.

Mitigation Recommendations

Since no patches are available for this vulnerability, mitigation must focus on compensating controls. Organizations should first identify any ROUTERmate devices in their network through asset inventory and network scanning. If found, immediate steps include changing the default SNMP community string to a strong, unique value or disabling SNMP entirely if it is not required. Network segmentation should be implemented to restrict SNMP access only to trusted management hosts. Employing access control lists (ACLs) on routers and firewalls to limit SNMP traffic to authorized IP addresses can reduce exposure. Monitoring SNMP traffic for unusual activity and enabling logging on network devices can help detect exploitation attempts. If devices are obsolete and unsupported, organizations should plan for replacement with modern, secure network equipment. Regular security audits and configuration reviews should be conducted to ensure no default credentials remain in use.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7deaae

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 9:41:45 PM

Last updated: 8/11/2025, 8:09:14 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats