CVE-1999-0889: Cisco 675 routers running CBOS allow remote attackers to establish telnet sessions if an exec or sup
Cisco 675 routers running CBOS allow remote attackers to establish telnet sessions if an exec or superuser password has not been set.
AI Analysis
Technical Summary
CVE-1999-0889 is a high-severity vulnerability affecting Cisco 675 routers running the Cisco Broadband Operating System (CBOS). The vulnerability arises when the router has not been configured with an exec or superuser password. In such cases, remote attackers can establish Telnet sessions without any authentication. Telnet is a protocol that allows remote command-line access to network devices, and unauthorized access can lead to full control over the router. The vulnerability is due to the absence of password protection, effectively allowing unauthenticated remote access. The CVSS score of 7.5 (high) reflects the ease of exploitation (network accessible, no authentication required) and the potential impact on confidentiality, integrity, and availability. Attackers gaining access via Telnet could intercept or manipulate network traffic, alter router configurations, or disrupt network operations. Although this vulnerability dates back to 1999 and affects older Cisco 675 routers, it remains relevant in environments where legacy equipment is still in use. No patches are available for this vulnerability, emphasizing the importance of proper configuration to mitigate risk. There are no known exploits in the wild currently documented, but the vulnerability is straightforward to exploit if the device is misconfigured.
Potential Impact
For European organizations, the impact of this vulnerability can be significant if legacy Cisco 675 routers are still deployed within their network infrastructure. Unauthorized Telnet access could allow attackers to compromise network routing, intercept sensitive data, or launch further attacks within the internal network. This could lead to data breaches, service disruptions, and loss of trust. Critical infrastructure providers, telecommunications companies, and enterprises relying on legacy network equipment are particularly at risk. Given the age of the vulnerability, many organizations may have replaced or upgraded affected devices; however, those that have not remain vulnerable. The lack of authentication requirement and network accessibility means attackers can exploit this remotely without user interaction, increasing the risk of compromise. The potential for full control over the router also threatens network integrity and availability, which can have cascading effects on business operations and compliance with data protection regulations such as GDPR.
Mitigation Recommendations
Since no patches are available for this vulnerability, mitigation must focus on configuration and network controls. Organizations should immediately verify that all Cisco 675 routers have strong exec and superuser passwords configured to prevent unauthorized Telnet access. If these devices are still in use, consider disabling Telnet entirely and replacing it with more secure management protocols such as SSH. Network segmentation should be employed to isolate legacy devices from untrusted networks, limiting exposure. Access control lists (ACLs) can restrict management access to trusted IP addresses only. Regular audits of network device configurations should be conducted to ensure compliance with security policies. Additionally, organizations should develop a plan to phase out legacy hardware that no longer receives security updates or vendor support. Monitoring network traffic for unusual Telnet connections can help detect potential exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-1999-0889: Cisco 675 routers running CBOS allow remote attackers to establish telnet sessions if an exec or sup
Description
Cisco 675 routers running CBOS allow remote attackers to establish telnet sessions if an exec or superuser password has not been set.
AI-Powered Analysis
Technical Analysis
CVE-1999-0889 is a high-severity vulnerability affecting Cisco 675 routers running the Cisco Broadband Operating System (CBOS). The vulnerability arises when the router has not been configured with an exec or superuser password. In such cases, remote attackers can establish Telnet sessions without any authentication. Telnet is a protocol that allows remote command-line access to network devices, and unauthorized access can lead to full control over the router. The vulnerability is due to the absence of password protection, effectively allowing unauthenticated remote access. The CVSS score of 7.5 (high) reflects the ease of exploitation (network accessible, no authentication required) and the potential impact on confidentiality, integrity, and availability. Attackers gaining access via Telnet could intercept or manipulate network traffic, alter router configurations, or disrupt network operations. Although this vulnerability dates back to 1999 and affects older Cisco 675 routers, it remains relevant in environments where legacy equipment is still in use. No patches are available for this vulnerability, emphasizing the importance of proper configuration to mitigate risk. There are no known exploits in the wild currently documented, but the vulnerability is straightforward to exploit if the device is misconfigured.
Potential Impact
For European organizations, the impact of this vulnerability can be significant if legacy Cisco 675 routers are still deployed within their network infrastructure. Unauthorized Telnet access could allow attackers to compromise network routing, intercept sensitive data, or launch further attacks within the internal network. This could lead to data breaches, service disruptions, and loss of trust. Critical infrastructure providers, telecommunications companies, and enterprises relying on legacy network equipment are particularly at risk. Given the age of the vulnerability, many organizations may have replaced or upgraded affected devices; however, those that have not remain vulnerable. The lack of authentication requirement and network accessibility means attackers can exploit this remotely without user interaction, increasing the risk of compromise. The potential for full control over the router also threatens network integrity and availability, which can have cascading effects on business operations and compliance with data protection regulations such as GDPR.
Mitigation Recommendations
Since no patches are available for this vulnerability, mitigation must focus on configuration and network controls. Organizations should immediately verify that all Cisco 675 routers have strong exec and superuser passwords configured to prevent unauthorized Telnet access. If these devices are still in use, consider disabling Telnet entirely and replacing it with more secure management protocols such as SSH. Network segmentation should be employed to isolate legacy devices from untrusted networks, limiting exposure. Access control lists (ACLs) can restrict management access to trusted IP addresses only. Regular audits of network device configurations should be conducted to ensure compliance with security policies. Additionally, organizations should develop a plan to phase out legacy hardware that no longer receives security updates or vendor support. Monitoring network traffic for unusual Telnet connections can help detect potential exploitation attempts early.
Affected Countries
Threat ID: 682ca32cb6fd31d6ed7df0cd
Added to database: 5/20/2025, 3:43:40 PM
Last enriched: 6/27/2025, 7:55:35 PM
Last updated: 2/7/2026, 7:57:41 PM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2025-68621: CWE-208: Observable Timing Discrepancy in TriliumNext Trilium
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.