Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0795: The NIS+ rpc.nisd server allows remote attackers to execute certain RPC calls without authentication

0
High
VulnerabilityCVE-1999-0795cve-1999-0795
Published: Sun Mar 01 1998 (03/01/1998, 05:00:00 UTC)
Source: NVD
Vendor/Project: sun
Product: solaris

Description

The NIS+ rpc.nisd server allows remote attackers to execute certain RPC calls without authentication to obtain system information, disable logging, or modify caches.

AI-Powered Analysis

AILast updated: 06/30/2025, 05:10:53 UTC

Technical Analysis

CVE-1999-0795 is a high-severity vulnerability affecting the NIS+ rpc.nisd server component on Sun Solaris systems. The rpc.nisd server is part of the Network Information Service Plus (NIS+), which is used for centralized management of system configuration data such as user and host information in Solaris environments. This vulnerability allows remote attackers to invoke certain Remote Procedure Calls (RPCs) without any authentication, enabling them to obtain sensitive system information, disable logging mechanisms, or modify internal caches. The lack of authentication means that an attacker can interact with the rpc.nisd server over the network without credentials, potentially leading to unauthorized disclosure of information, tampering with system state, and disruption of normal logging activities. The CVSS v2 score of 7.5 reflects the ease of exploitation (network vector, no authentication required), and the significant impact on confidentiality, integrity, and availability. Although this vulnerability was published in 1998 and no patches are available, it remains relevant for legacy Solaris systems still in operation. Exploitation could allow attackers to gather intelligence about the system, cover their tracks by disabling logs, and manipulate cache data, which may affect system behavior or security policies.

Potential Impact

For European organizations running legacy Solaris systems with NIS+ enabled, this vulnerability poses a significant risk. Unauthorized access to system information can facilitate further attacks by revealing user accounts, hostnames, or configuration details. Disabling logging impairs incident detection and response capabilities, increasing the risk of prolonged undetected intrusions. Modifying caches could disrupt system operations or security controls, potentially leading to denial of service or privilege escalation scenarios. Organizations in sectors with high regulatory requirements for data protection and system integrity, such as finance, healthcare, and critical infrastructure, may face compliance issues if exploited. Additionally, the presence of this vulnerability could be leveraged by threat actors targeting outdated infrastructure, especially in environments where Solaris remains in use due to legacy application dependencies.

Mitigation Recommendations

Given that no official patch is available, European organizations should consider the following specific mitigations: 1) Disable the NIS+ rpc.nisd service if it is not strictly required, as removing the vulnerable service eliminates the attack surface. 2) Restrict network access to the rpc.nisd server using firewall rules or network segmentation, allowing only trusted management hosts to communicate with it. 3) Monitor network traffic for unusual RPC calls targeting the rpc.nisd port to detect potential exploitation attempts. 4) Implement compensating controls such as enhanced logging at network perimeter devices and intrusion detection systems to identify suspicious activity. 5) Plan for migration away from Solaris NIS+ to more secure directory services or identity management solutions that support modern authentication and encryption. 6) Conduct regular security audits of legacy systems to identify and mitigate similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7de92c

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/30/2025, 5:10:53 AM

Last updated: 2/7/2026, 6:11:01 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats