Skip to main content

CVE-1999-0886: The security descriptor for RASMAN allows users to point to an alternate location via the Windows NT

High
VulnerabilityCVE-1999-0886cve-1999-0886cwe-16
Published: Fri Sep 17 1999 (09/17/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_nt

Description

The security descriptor for RASMAN allows users to point to an alternate location via the Windows NT Service Control Manager.

AI-Powered Analysis

AILast updated: 06/27/2025, 14:56:55 UTC

Technical Analysis

CVE-1999-0886 is a critical security vulnerability affecting Microsoft Windows NT 4.0, specifically related to the security descriptor configuration of the Remote Access Service Manager (RASMAN). The vulnerability arises because the security descriptor for RASMAN allows users with certain privileges to redirect or point the service to an alternate location via the Windows NT Service Control Manager. This misconfiguration can be exploited by authenticated users to manipulate the service behavior, potentially leading to complete compromise of the affected system. The vulnerability impacts confidentiality, integrity, and availability (CIA triad) as it allows attackers to execute arbitrary code or escalate privileges by controlling the service's execution context. The CVSS v2 score of 9.0 reflects the high severity, with network attack vector (AV:N), low attack complexity (AC:L), requiring authentication (Au:S), and complete impact on confidentiality, integrity, and availability (C:C/I:C/A:C). Although no known exploits have been reported in the wild, the availability of patches from Microsoft (MS99-041) mitigates the risk if applied promptly. The vulnerability is classified under CWE-16, which relates to configuration issues leading to improper access control. Given the age of the vulnerability and the affected product, modern systems are not impacted; however, legacy systems still running Windows NT 4.0 remain at risk if unpatched.

Potential Impact

For European organizations, the impact of this vulnerability is primarily significant for those still operating legacy Windows NT 4.0 systems, which may be found in industrial control systems, legacy financial systems, or specialized infrastructure. Exploitation could lead to unauthorized privilege escalation, allowing attackers to gain control over critical systems, potentially leading to data breaches, disruption of services, or further lateral movement within the network. Confidential information could be exposed or altered, and system availability could be compromised, affecting business continuity. Although modern Windows versions are not affected, organizations with legacy dependencies or insufficient patch management could face serious operational and reputational damage. Additionally, compliance with European data protection regulations such as GDPR could be jeopardized if personal data confidentiality is compromised due to exploitation of this vulnerability.

Mitigation Recommendations

1. Immediate application of the official Microsoft patch MS99-041 to all affected Windows NT 4.0 systems is essential. 2. Conduct a thorough inventory to identify any remaining Windows NT 4.0 systems in the environment and prioritize their upgrade or isolation. 3. Restrict access to the Windows NT Service Control Manager to only highly trusted administrators to reduce the risk of exploitation by authenticated users. 4. Implement network segmentation to isolate legacy systems from critical business networks and limit exposure. 5. Employ strict monitoring and logging of service control operations to detect any unauthorized attempts to manipulate RASMAN or other critical services. 6. Develop and enforce a legacy system decommissioning plan to phase out unsupported operating systems, reducing long-term risk. 7. Regularly review and harden security descriptors and permissions on critical services to prevent misconfigurations similar to this vulnerability.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df264

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 2:56:55 PM

Last updated: 8/8/2025, 6:24:58 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats