Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0792: ROUTERmate has a default SNMP community name which allows remote attackers to modify its configurati

0
Medium
VulnerabilityCVE-1999-0792cve-1999-0792
Published: Tue Sep 01 1998 (09/01/1998, 04:00:00 UTC)
Source: NVD
Vendor/Project: osicom
Product: routermate

Description

ROUTERmate has a default SNMP community name which allows remote attackers to modify its configuration.

AI-Powered Analysis

AILast updated: 07/01/2025, 21:41:45 UTC

Technical Analysis

CVE-1999-0792 identifies a vulnerability in ROUTERmate, a network device produced by Osicom, where the device uses a default SNMP (Simple Network Management Protocol) community name that is well-known and unchanged by default. SNMP community names function as passwords that control access to the device's management interface. In this case, the default community name allows remote attackers to connect to the device's SNMP service without authentication and modify its configuration settings. Since SNMP is commonly used for network device management, unauthorized modification can lead to disruption of network operations or redirection of traffic. The vulnerability is characterized by a CVSS base score of 5.0 (medium severity), with the vector AV:N/AC:L/Au:N/C:N/I:N/A:P, indicating that the attack can be performed remotely over the network with low attack complexity, no authentication required, no impact on confidentiality or integrity, but with an impact on availability. The vulnerability dates back to 1998, and no patches or fixes are available, likely due to the age and obsolescence of the product. There are no known exploits in the wild currently documented. The root cause is the failure to change or disable the default SNMP community string, which is a common security misconfiguration in network devices, especially older ones.

Potential Impact

For European organizations, the impact of this vulnerability depends on the presence and use of ROUTERmate devices within their network infrastructure. If such devices are still operational, attackers could remotely modify router configurations, potentially causing network outages or degraded service availability. This could disrupt business operations, especially for organizations relying on continuous network connectivity. Although the vulnerability does not directly compromise confidentiality or integrity, the availability impact could lead to denial of service conditions or misrouting of traffic, which in turn could indirectly affect data flows and operational integrity. Given the age of the vulnerability and the lack of patches, affected organizations may face challenges in remediation if devices are still in use. Additionally, the vulnerability could be leveraged as part of a larger attack chain targeting network infrastructure. European organizations with legacy network equipment or insufficient network segmentation are at higher risk.

Mitigation Recommendations

Since no patches are available for this vulnerability, mitigation must focus on compensating controls. Organizations should first identify any ROUTERmate devices in their network through asset inventory and network scanning. If found, immediate steps include changing the default SNMP community string to a strong, unique value or disabling SNMP entirely if it is not required. Network segmentation should be implemented to restrict SNMP access only to trusted management hosts. Employing access control lists (ACLs) on routers and firewalls to limit SNMP traffic to authorized IP addresses can reduce exposure. Monitoring SNMP traffic for unusual activity and enabling logging on network devices can help detect exploitation attempts. If devices are obsolete and unsupported, organizations should plan for replacement with modern, secure network equipment. Regular security audits and configuration reviews should be conducted to ensure no default credentials remain in use.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7deaae

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 9:41:45 PM

Last updated: 2/7/2026, 5:51:43 PM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats