Skip to main content

CVE-1999-0875: DHCP clients with ICMP Router Discovery Protocol (IRDP) enabled allow remote attackers to modify the

High
VulnerabilityCVE-1999-0875cve-1999-0875cwe-16
Published: Wed Aug 11 1999 (08/11/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_2000

Description

DHCP clients with ICMP Router Discovery Protocol (IRDP) enabled allow remote attackers to modify their default routes.

AI-Powered Analysis

AILast updated: 06/27/2025, 18:24:33 UTC

Technical Analysis

CVE-1999-0875 is a high-severity vulnerability affecting Microsoft Windows 2000 DHCP clients that have the ICMP Router Discovery Protocol (IRDP) enabled. IRDP is a protocol that allows hosts to discover the IP addresses of routers on their local network segment by listening to ICMP Router Advertisement messages. In this vulnerability, remote attackers can send spoofed ICMP Router Advertisement messages to a vulnerable DHCP client, causing it to modify its default route to an attacker-controlled IP address. This manipulation of the routing table can redirect network traffic through the attacker's machine, enabling man-in-the-middle attacks, traffic interception, or denial of service. The vulnerability is characterized by a CVSS v2 score of 7.5, indicating high severity, with network attack vector, low attack complexity, no authentication required, and impacts on confidentiality, integrity, and availability. The affected versions are Windows 2000 systems with IRDP enabled, which was not enabled by default but could be activated in certain network configurations. No patches are available for this vulnerability, and there are no known exploits in the wild, but the potential impact remains significant due to the ability to alter routing behavior remotely without authentication or user interaction. The underlying weakness corresponds to CWE-16 (Configuration), highlighting that improper or insecure default configurations can lead to exploitable conditions.

Potential Impact

For European organizations, this vulnerability poses a risk primarily in environments where legacy Windows 2000 systems are still operational and configured with IRDP enabled. Although Windows 2000 is an outdated operating system, some industrial control systems, legacy applications, or specialized network equipment might still rely on it. Exploitation could allow attackers to redirect network traffic, leading to interception of sensitive data, disruption of communications, or insertion of malicious payloads. This could compromise confidentiality and integrity of data, and potentially availability if routing is manipulated to cause network outages. Given the high connectivity and regulatory requirements in Europe, such as GDPR, unauthorized data interception could lead to compliance violations and reputational damage. The lack of patches means organizations must rely on network-level controls and configuration management to mitigate risk. The threat is less relevant to modern systems but remains a concern in legacy environments, especially in sectors like manufacturing, utilities, or government agencies where legacy systems persist.

Mitigation Recommendations

Since no patches are available, European organizations should take the following specific measures: 1) Identify and inventory all Windows 2000 systems and verify if IRDP is enabled; disable IRDP on all DHCP clients unless absolutely necessary. 2) Segment legacy systems from critical network infrastructure using VLANs or firewall rules to limit exposure to untrusted networks. 3) Implement network-level filtering to block unauthorized ICMP Router Advertisement messages, using intrusion detection/prevention systems or router ACLs. 4) Monitor network traffic for unusual ICMP Router Advertisement activity that could indicate exploitation attempts. 5) Plan and prioritize migration away from Windows 2000 to supported operating systems to eliminate the vulnerability. 6) Educate network administrators about the risks of legacy protocols like IRDP and enforce secure network configuration policies. These steps go beyond generic advice by focusing on protocol-specific controls and legacy system management.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df176

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 6:24:33 PM

Last updated: 7/31/2025, 6:10:31 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats