Skip to main content

CVE-1999-0921: BMC Patrol allows any remote attacker to flood its UDP port, causing a denial of service.

Medium
VulnerabilityCVE-1999-0921cve-1999-0921denial of service
Published: Thu Apr 01 1999 (04/01/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: bmc
Product: patrol_agent

Description

BMC Patrol allows any remote attacker to flood its UDP port, causing a denial of service.

AI-Powered Analysis

AILast updated: 07/01/2025, 18:54:58 UTC

Technical Analysis

CVE-1999-0921 is a vulnerability affecting BMC Patrol Agent version 3.2.5, where the software's UDP port can be flooded by any remote attacker, resulting in a denial of service (DoS). The vulnerability arises because the Patrol Agent listens on a UDP port and does not implement sufficient rate limiting or filtering mechanisms to prevent malicious traffic floods. An attacker can send a high volume of UDP packets to the Patrol Agent's listening port, overwhelming its processing capabilities and causing the service to become unresponsive or crash. This vulnerability does not impact confidentiality or integrity, as it only disrupts availability. The CVSS score is 5.0 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no authentication (Au:N), has low attack complexity (AC:L), and impacts availability only (A:P). No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the vulnerability (published in 1999) and the specific affected version, the risk today depends on whether organizations still run this outdated Patrol Agent version and expose its UDP port to untrusted networks.

Potential Impact

For European organizations, the primary impact of this vulnerability is service disruption of the BMC Patrol Agent monitoring capabilities. Since BMC Patrol is used for enterprise system and network monitoring, a successful DoS attack could impair an organization's ability to monitor critical infrastructure, potentially delaying detection of other security incidents or operational issues. This could affect sectors relying heavily on continuous monitoring such as finance, telecommunications, energy, and government services. However, the impact is limited to availability of the Patrol Agent service itself and does not directly compromise data confidentiality or integrity. Organizations that expose the Patrol Agent UDP port to the internet or untrusted networks are at higher risk. The lack of a patch means organizations must rely on network-level mitigations or upgrading to newer, supported monitoring solutions. The medium severity rating reflects these factors.

Mitigation Recommendations

Since no patch is available for this vulnerability, European organizations should implement the following specific mitigations: 1) Restrict network access to the Patrol Agent UDP port (default port 4800) using firewalls or network access control lists (ACLs) to allow only trusted management and monitoring hosts. 2) Employ rate limiting or UDP flood protection mechanisms on perimeter devices to detect and block excessive UDP traffic targeting the Patrol Agent port. 3) Monitor network traffic for unusual spikes or patterns indicative of UDP flooding attacks. 4) Consider upgrading to a newer version of BMC Patrol or alternative monitoring solutions that do not have this vulnerability and are actively supported. 5) If upgrading is not immediately feasible, isolate the Patrol Agent on a dedicated management VLAN or network segment to reduce exposure. 6) Regularly review and update network segmentation and access policies to minimize attack surface. These steps go beyond generic advice by focusing on network-level controls and architectural changes to compensate for the lack of a vendor patch.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7def48

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 6:54:58 PM

Last updated: 7/31/2025, 5:47:14 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats