Skip to main content

CVE-1999-1010: An SSH 1.2.27 server allows a client to use the "none" cipher, even if it is not allowed by the serv

Low
VulnerabilityCVE-1999-1010cve-1999-1010
Published: Tue Dec 14 1999 (12/14/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: openbsd
Product: openssh

Description

An SSH 1.2.27 server allows a client to use the "none" cipher, even if it is not allowed by the server policy.

AI-Powered Analysis

AILast updated: 07/01/2025, 12:55:41 UTC

Technical Analysis

CVE-1999-1010 is a vulnerability found in OpenSSH version 1.2.27, an early implementation of the widely used Secure Shell (SSH) protocol. This vulnerability allows a client to negotiate the use of the "none" cipher for encryption, even when the server's policy explicitly disallows it. The "none" cipher means that no encryption is applied to the SSH session, resulting in all transmitted data being sent in plaintext. This undermines the fundamental security guarantees of SSH, which are confidentiality and integrity of data in transit. The vulnerability arises from improper enforcement of cipher restrictions on the server side, allowing clients to bypass encryption requirements. Although this issue is specific to a very old version of OpenSSH (1.2.27), it highlights a critical security flaw where an attacker or malicious client could intercept or manipulate sensitive information such as credentials, commands, or data transferred over the SSH session. The CVSS score of 2.1 (low severity) reflects the limited impact due to the requirement of local access (AV:L) and the lack of authentication needed (Au:N), but the confidentiality impact is partial (C:P). No known exploits are reported in the wild, and no patches are available, likely due to the obsolescence of this version. Modern OpenSSH versions have addressed this issue by removing support for the "none" cipher or enforcing strict cipher policies.

Potential Impact

For European organizations, the direct impact of this vulnerability today is minimal due to the obsolescence of OpenSSH 1.2.27 and the widespread adoption of updated SSH versions. However, if legacy systems or embedded devices running this outdated SSH version remain in use, they could be exposed to interception of sensitive data, leading to confidentiality breaches. This could affect sectors with legacy infrastructure such as industrial control systems, government agencies, or research institutions that have not updated their SSH implementations. The exposure of plaintext credentials or commands could facilitate further lateral movement or unauthorized access within networks. While the vulnerability does not affect integrity or availability, the compromise of confidentiality alone can have significant repercussions, including data leaks, espionage, or compliance violations under regulations like GDPR. European organizations should be aware of this risk primarily in the context of legacy system audits and decommissioning.

Mitigation Recommendations

1. Immediate mitigation is to upgrade all OpenSSH servers to the latest supported version, as modern versions have removed support for the "none" cipher and enforce strict cipher negotiation policies. 2. Conduct an inventory and audit of all systems to identify any running OpenSSH 1.2.27 or similarly outdated SSH implementations, especially in legacy or embedded environments. 3. If upgrading is not immediately feasible, restrict network access to vulnerable SSH servers using network segmentation, firewalls, or VPNs to limit exposure to untrusted clients. 4. Implement monitoring and logging of SSH sessions to detect any unusual or unencrypted connections. 5. Educate system administrators about the risks of using deprecated software and enforce policies for timely patching and updates. 6. For critical legacy systems, consider deploying compensating controls such as SSH tunneling through secure gateways or replacing SSH with alternative secure remote access solutions.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df4f3

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 12:55:41 PM

Last updated: 7/25/2025, 10:30:59 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats