Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1028: Symantec pcAnywhere 8.0 allows remote attackers to cause a denial of service (CPU utilization) via a

0
Medium
VulnerabilityCVE-1999-1028cve-1999-1028denial of service
Published: Fri May 28 1999 (05/28/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: symantec
Product: pcanywhere

Description

Symantec pcAnywhere 8.0 allows remote attackers to cause a denial of service (CPU utilization) via a large amount of data to port 5631.

AI-Powered Analysis

AILast updated: 07/01/2025, 17:26:59 UTC

Technical Analysis

CVE-1999-1028 is a vulnerability found in Symantec pcAnywhere version 8.0, a remote administration tool widely used in the late 1990s and early 2000s. The vulnerability allows remote attackers to cause a denial of service (DoS) condition by sending a large volume of data to the service's listening port, 5631. This flood of data leads to excessive CPU utilization, effectively degrading or halting the service's ability to function properly. The attack does not require authentication or user interaction, making it remotely exploitable over the network. The vulnerability impacts availability only, with no direct compromise of confidentiality or integrity. Since pcAnywhere is a remote access tool, disruption of its service can prevent legitimate remote management and support operations. The CVSS score of 5.0 (medium severity) reflects the moderate impact and ease of exploitation without authentication. No patches are available for this vulnerability, and there are no known exploits in the wild documented, likely due to the age of the software and its declining usage. However, legacy systems still running pcAnywhere 8.0 remain susceptible to this DoS attack if exposed to untrusted networks.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential disruption of remote administration capabilities. Organizations relying on pcAnywhere 8.0 for remote support or management could experience service outages, leading to operational delays and increased support costs. In critical infrastructure or enterprise environments where remote access tools are essential for timely maintenance, this could translate into reduced availability of key systems. Although the vulnerability does not lead to data breaches or system compromise, the denial of service could indirectly affect business continuity and incident response capabilities. Given that pcAnywhere is an older product, the impact is mostly relevant to organizations with legacy systems or those that have not migrated to modern remote access solutions. The lack of a patch means organizations must rely on network-level mitigations and system upgrades to reduce risk.

Mitigation Recommendations

Since no patch is available for CVE-1999-1028, European organizations should implement several specific mitigations: 1) Immediately restrict access to port 5631 using firewalls or network access control lists (ACLs) to allow only trusted IP addresses or VPN connections. 2) Disable or uninstall pcAnywhere 8.0 on all systems where it is no longer necessary, replacing it with modern, supported remote access tools that receive regular security updates. 3) Monitor network traffic for unusual spikes or large volumes of data targeting port 5631 to detect potential exploitation attempts early. 4) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection rules targeting DoS attempts against pcAnywhere services. 5) Segment networks to isolate legacy systems running pcAnywhere from the broader corporate network and the internet to minimize exposure. 6) Develop incident response plans that include procedures for handling denial of service attacks affecting remote administration tools. These targeted actions go beyond generic advice by focusing on network-level controls and legacy system management specific to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7df03e

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 5:26:59 PM

Last updated: 2/3/2026, 9:49:45 PM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats