Skip to main content

CVE-1999-0889: Cisco 675 routers running CBOS allow remote attackers to establish telnet sessions if an exec or sup

High
VulnerabilityCVE-1999-0889cve-1999-0889
Published: Thu Jul 01 1999 (07/01/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: cisco
Product: 675_router

Description

Cisco 675 routers running CBOS allow remote attackers to establish telnet sessions if an exec or superuser password has not been set.

AI-Powered Analysis

AILast updated: 06/27/2025, 19:55:35 UTC

Technical Analysis

CVE-1999-0889 is a high-severity vulnerability affecting Cisco 675 routers running the Cisco Broadband Operating System (CBOS). The vulnerability arises when the router has not been configured with an exec or superuser password. In such cases, remote attackers can establish Telnet sessions without any authentication. Telnet is a protocol that allows remote command-line access to network devices, and unauthorized access can lead to full control over the router. The vulnerability is due to the absence of password protection, effectively allowing unauthenticated remote access. The CVSS score of 7.5 (high) reflects the ease of exploitation (network accessible, no authentication required) and the potential impact on confidentiality, integrity, and availability. Attackers gaining access via Telnet could intercept or manipulate network traffic, alter router configurations, or disrupt network operations. Although this vulnerability dates back to 1999 and affects older Cisco 675 routers, it remains relevant in environments where legacy equipment is still in use. No patches are available for this vulnerability, emphasizing the importance of proper configuration to mitigate risk. There are no known exploits in the wild currently documented, but the vulnerability is straightforward to exploit if the device is misconfigured.

Potential Impact

For European organizations, the impact of this vulnerability can be significant if legacy Cisco 675 routers are still deployed within their network infrastructure. Unauthorized Telnet access could allow attackers to compromise network routing, intercept sensitive data, or launch further attacks within the internal network. This could lead to data breaches, service disruptions, and loss of trust. Critical infrastructure providers, telecommunications companies, and enterprises relying on legacy network equipment are particularly at risk. Given the age of the vulnerability, many organizations may have replaced or upgraded affected devices; however, those that have not remain vulnerable. The lack of authentication requirement and network accessibility means attackers can exploit this remotely without user interaction, increasing the risk of compromise. The potential for full control over the router also threatens network integrity and availability, which can have cascading effects on business operations and compliance with data protection regulations such as GDPR.

Mitigation Recommendations

Since no patches are available for this vulnerability, mitigation must focus on configuration and network controls. Organizations should immediately verify that all Cisco 675 routers have strong exec and superuser passwords configured to prevent unauthorized Telnet access. If these devices are still in use, consider disabling Telnet entirely and replacing it with more secure management protocols such as SSH. Network segmentation should be employed to isolate legacy devices from untrusted networks, limiting exposure. Access control lists (ACLs) can restrict management access to trusted IP addresses only. Regular audits of network device configurations should be conducted to ensure compliance with security policies. Additionally, organizations should develop a plan to phase out legacy hardware that no longer receives security updates or vendor support. Monitoring network traffic for unusual Telnet connections can help detect potential exploitation attempts early.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df0cd

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 7:55:35 PM

Last updated: 7/28/2025, 8:46:44 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats