CVE-1999-0889: Cisco 675 routers running CBOS allow remote attackers to establish telnet sessions if an exec or sup
Cisco 675 routers running CBOS allow remote attackers to establish telnet sessions if an exec or superuser password has not been set.
AI Analysis
Technical Summary
CVE-1999-0889 is a high-severity vulnerability affecting Cisco 675 routers running the Cisco Broadband Operating System (CBOS). The vulnerability arises when the router has not been configured with an exec or superuser password. In such cases, remote attackers can establish Telnet sessions without any authentication. Telnet is a protocol that allows remote command-line access to network devices, and unauthorized access can lead to full control over the router. The vulnerability is due to the absence of password protection, effectively allowing unauthenticated remote access. The CVSS score of 7.5 (high) reflects the ease of exploitation (network accessible, no authentication required) and the potential impact on confidentiality, integrity, and availability. Attackers gaining access via Telnet could intercept or manipulate network traffic, alter router configurations, or disrupt network operations. Although this vulnerability dates back to 1999 and affects older Cisco 675 routers, it remains relevant in environments where legacy equipment is still in use. No patches are available for this vulnerability, emphasizing the importance of proper configuration to mitigate risk. There are no known exploits in the wild currently documented, but the vulnerability is straightforward to exploit if the device is misconfigured.
Potential Impact
For European organizations, the impact of this vulnerability can be significant if legacy Cisco 675 routers are still deployed within their network infrastructure. Unauthorized Telnet access could allow attackers to compromise network routing, intercept sensitive data, or launch further attacks within the internal network. This could lead to data breaches, service disruptions, and loss of trust. Critical infrastructure providers, telecommunications companies, and enterprises relying on legacy network equipment are particularly at risk. Given the age of the vulnerability, many organizations may have replaced or upgraded affected devices; however, those that have not remain vulnerable. The lack of authentication requirement and network accessibility means attackers can exploit this remotely without user interaction, increasing the risk of compromise. The potential for full control over the router also threatens network integrity and availability, which can have cascading effects on business operations and compliance with data protection regulations such as GDPR.
Mitigation Recommendations
Since no patches are available for this vulnerability, mitigation must focus on configuration and network controls. Organizations should immediately verify that all Cisco 675 routers have strong exec and superuser passwords configured to prevent unauthorized Telnet access. If these devices are still in use, consider disabling Telnet entirely and replacing it with more secure management protocols such as SSH. Network segmentation should be employed to isolate legacy devices from untrusted networks, limiting exposure. Access control lists (ACLs) can restrict management access to trusted IP addresses only. Regular audits of network device configurations should be conducted to ensure compliance with security policies. Additionally, organizations should develop a plan to phase out legacy hardware that no longer receives security updates or vendor support. Monitoring network traffic for unusual Telnet connections can help detect potential exploitation attempts early.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-1999-0889: Cisco 675 routers running CBOS allow remote attackers to establish telnet sessions if an exec or sup
Description
Cisco 675 routers running CBOS allow remote attackers to establish telnet sessions if an exec or superuser password has not been set.
AI-Powered Analysis
Technical Analysis
CVE-1999-0889 is a high-severity vulnerability affecting Cisco 675 routers running the Cisco Broadband Operating System (CBOS). The vulnerability arises when the router has not been configured with an exec or superuser password. In such cases, remote attackers can establish Telnet sessions without any authentication. Telnet is a protocol that allows remote command-line access to network devices, and unauthorized access can lead to full control over the router. The vulnerability is due to the absence of password protection, effectively allowing unauthenticated remote access. The CVSS score of 7.5 (high) reflects the ease of exploitation (network accessible, no authentication required) and the potential impact on confidentiality, integrity, and availability. Attackers gaining access via Telnet could intercept or manipulate network traffic, alter router configurations, or disrupt network operations. Although this vulnerability dates back to 1999 and affects older Cisco 675 routers, it remains relevant in environments where legacy equipment is still in use. No patches are available for this vulnerability, emphasizing the importance of proper configuration to mitigate risk. There are no known exploits in the wild currently documented, but the vulnerability is straightforward to exploit if the device is misconfigured.
Potential Impact
For European organizations, the impact of this vulnerability can be significant if legacy Cisco 675 routers are still deployed within their network infrastructure. Unauthorized Telnet access could allow attackers to compromise network routing, intercept sensitive data, or launch further attacks within the internal network. This could lead to data breaches, service disruptions, and loss of trust. Critical infrastructure providers, telecommunications companies, and enterprises relying on legacy network equipment are particularly at risk. Given the age of the vulnerability, many organizations may have replaced or upgraded affected devices; however, those that have not remain vulnerable. The lack of authentication requirement and network accessibility means attackers can exploit this remotely without user interaction, increasing the risk of compromise. The potential for full control over the router also threatens network integrity and availability, which can have cascading effects on business operations and compliance with data protection regulations such as GDPR.
Mitigation Recommendations
Since no patches are available for this vulnerability, mitigation must focus on configuration and network controls. Organizations should immediately verify that all Cisco 675 routers have strong exec and superuser passwords configured to prevent unauthorized Telnet access. If these devices are still in use, consider disabling Telnet entirely and replacing it with more secure management protocols such as SSH. Network segmentation should be employed to isolate legacy devices from untrusted networks, limiting exposure. Access control lists (ACLs) can restrict management access to trusted IP addresses only. Regular audits of network device configurations should be conducted to ensure compliance with security policies. Additionally, organizations should develop a plan to phase out legacy hardware that no longer receives security updates or vendor support. Monitoring network traffic for unusual Telnet connections can help detect potential exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32cb6fd31d6ed7df0cd
Added to database: 5/20/2025, 3:43:40 PM
Last enriched: 6/27/2025, 7:55:35 PM
Last updated: 7/28/2025, 8:46:44 AM
Views: 9
Related Threats
CVE-2025-50610: n/a
HighCVE-2025-50609: n/a
HighCVE-2025-50608: n/a
HighCVE-2025-23298: CWE-94 Improper Control of Generation of Code ('Code Injection') in NVIDIA NVIDIA Merlin Transformers4Rec
HighCVE-2025-23296: CWE-94 Improper Control of Generation of Code ('Code Injection') in NVIDIA NVIDIA Isaac-GR00T N1
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.