CVE-1999-0910: Microsoft Site Server and Commercial Internet System (MCIS) do not set an expiration for a cookie, w
Microsoft Site Server and Commercial Internet System (MCIS) do not set an expiration for a cookie, which could then be cached by a proxy and inadvertently used by a different user.
AI Analysis
Technical Summary
CVE-1999-0910 is a medium-severity vulnerability affecting Microsoft Site Server and Commercial Internet System (MCIS) versions 2.0, 2.5, and 3.0. The core issue arises because these products do not set an expiration attribute on cookies they generate. Without an explicit expiration, cookies are treated as session cookies by browsers but can be cached indefinitely by intermediary proxy servers. This behavior can lead to a security risk where a cached cookie is inadvertently reused by a different user accessing the same proxy, potentially allowing unauthorized access or session hijacking. The vulnerability is network exploitable without authentication (AV:N/AC:L/Au:N) and impacts confidentiality (C:P) but does not affect integrity or availability. Since the cookies can be cached and reused, sensitive session information or authentication tokens could be leaked to unintended users, compromising user privacy and security. Microsoft has released patches addressing this issue, which involve setting proper cookie expiration attributes to prevent proxy caching. No known exploits have been reported in the wild, but the vulnerability remains relevant for legacy systems still running these versions of MCIS or Site Server. The vulnerability was published in 1999 and has a CVSS v2 score of 5.0, reflecting a medium risk level.
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns confidentiality breaches due to cookie reuse via proxy caching. Organizations using legacy Microsoft Site Server or MCIS versions in their web infrastructure risk unauthorized access to user sessions or sensitive information if proxies cache session cookies. This can lead to data leakage, privacy violations under GDPR, and potential reputational damage. Although modern web architectures and browsers have largely mitigated such risks, any remaining legacy deployments in sectors such as government, education, or industries relying on older Microsoft web products could be vulnerable. The risk is exacerbated in environments with shared proxy servers or where multiple users access the internet through common caching proxies. Since the vulnerability does not affect integrity or availability, the primary concern is unauthorized disclosure of information. The absence of known exploits reduces immediate risk, but unpatched systems remain susceptible to targeted attacks or insider threats leveraging cached cookies.
Mitigation Recommendations
European organizations should first identify any legacy deployments of Microsoft Site Server or MCIS versions 2.0, 2.5, or 3.0 within their infrastructure. Immediate mitigation involves applying the official Microsoft security patch MS99-035, which sets appropriate cookie expiration attributes to prevent proxy caching. If patching is not feasible, organizations should configure proxy servers to disable caching of cookies or sensitive HTTP headers, ensuring that session cookies are never stored or reused. Additionally, implementing strict HTTP headers such as 'Cache-Control: no-store' and 'Pragma: no-cache' can help prevent caching at intermediaries. Network segmentation and limiting access to legacy systems can reduce exposure. Monitoring proxy logs for unusual cookie reuse patterns may help detect exploitation attempts. Finally, organizations should plan to upgrade legacy web infrastructure to supported, modern platforms that follow current security best practices for session management.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Belgium
CVE-1999-0910: Microsoft Site Server and Commercial Internet System (MCIS) do not set an expiration for a cookie, w
Description
Microsoft Site Server and Commercial Internet System (MCIS) do not set an expiration for a cookie, which could then be cached by a proxy and inadvertently used by a different user.
AI-Powered Analysis
Technical Analysis
CVE-1999-0910 is a medium-severity vulnerability affecting Microsoft Site Server and Commercial Internet System (MCIS) versions 2.0, 2.5, and 3.0. The core issue arises because these products do not set an expiration attribute on cookies they generate. Without an explicit expiration, cookies are treated as session cookies by browsers but can be cached indefinitely by intermediary proxy servers. This behavior can lead to a security risk where a cached cookie is inadvertently reused by a different user accessing the same proxy, potentially allowing unauthorized access or session hijacking. The vulnerability is network exploitable without authentication (AV:N/AC:L/Au:N) and impacts confidentiality (C:P) but does not affect integrity or availability. Since the cookies can be cached and reused, sensitive session information or authentication tokens could be leaked to unintended users, compromising user privacy and security. Microsoft has released patches addressing this issue, which involve setting proper cookie expiration attributes to prevent proxy caching. No known exploits have been reported in the wild, but the vulnerability remains relevant for legacy systems still running these versions of MCIS or Site Server. The vulnerability was published in 1999 and has a CVSS v2 score of 5.0, reflecting a medium risk level.
Potential Impact
For European organizations, the impact of this vulnerability primarily concerns confidentiality breaches due to cookie reuse via proxy caching. Organizations using legacy Microsoft Site Server or MCIS versions in their web infrastructure risk unauthorized access to user sessions or sensitive information if proxies cache session cookies. This can lead to data leakage, privacy violations under GDPR, and potential reputational damage. Although modern web architectures and browsers have largely mitigated such risks, any remaining legacy deployments in sectors such as government, education, or industries relying on older Microsoft web products could be vulnerable. The risk is exacerbated in environments with shared proxy servers or where multiple users access the internet through common caching proxies. Since the vulnerability does not affect integrity or availability, the primary concern is unauthorized disclosure of information. The absence of known exploits reduces immediate risk, but unpatched systems remain susceptible to targeted attacks or insider threats leveraging cached cookies.
Mitigation Recommendations
European organizations should first identify any legacy deployments of Microsoft Site Server or MCIS versions 2.0, 2.5, or 3.0 within their infrastructure. Immediate mitigation involves applying the official Microsoft security patch MS99-035, which sets appropriate cookie expiration attributes to prevent proxy caching. If patching is not feasible, organizations should configure proxy servers to disable caching of cookies or sensitive HTTP headers, ensuring that session cookies are never stored or reused. Additionally, implementing strict HTTP headers such as 'Cache-Control: no-store' and 'Pragma: no-cache' can help prevent caching at intermediaries. Network segmentation and limiting access to legacy systems can reduce exposure. Monitoring proxy logs for unusual cookie reuse patterns may help detect exploitation attempts. Finally, organizations should plan to upgrade legacy web infrastructure to supported, modern platforms that follow current security best practices for session management.
Affected Countries
Patch Information
Threat ID: 682ca32cb6fd31d6ed7df22a
Added to database: 5/20/2025, 3:43:40 PM
Last enriched: 7/1/2025, 3:40:59 PM
Last updated: 2/7/2026, 11:08:14 AM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.