Skip to main content

CVE-1999-1042: Cisco Resource Manager (CRM) 1.0 and 1.1 creates world-readable log files and temporary files, which

Low
VulnerabilityCVE-1999-1042cve-1999-1042rce
Published: Fri Dec 31 1999 (12/31/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: cisco
Product: resource_manager

Description

Cisco Resource Manager (CRM) 1.0 and 1.1 creates world-readable log files and temporary files, which may expose sensitive information, to local users such as user IDs, passwords and SNMP community strings.

AI-Powered Analysis

AILast updated: 07/01/2025, 11:58:48 UTC

Technical Analysis

CVE-1999-1042 is a vulnerability found in Cisco Resource Manager (CRM) versions 1.0 and 1.1. The issue arises because these versions create log files and temporary files with world-readable permissions. This misconfiguration allows any local user on the affected system to read these files, potentially exposing sensitive information such as user IDs, passwords, and SNMP community strings. Since these credentials and identifiers are critical for network management and security, their exposure can lead to unauthorized access or further exploitation. The vulnerability is local in nature, requiring access to the system to exploit, and does not allow remote code execution or direct remote exploitation. The CVSS score of 1.2 reflects the low severity, primarily due to the high attack complexity and the need for local access without authentication. No patches are available for this vulnerability, and there are no known exploits in the wild. However, the exposure of sensitive credentials can facilitate privilege escalation or lateral movement within a network if an attacker gains local access.

Potential Impact

For European organizations using Cisco Resource Manager versions 1.0 or 1.1, this vulnerability could lead to the unintended disclosure of sensitive network management credentials. Although the vulnerability requires local access, if an attacker or unauthorized user gains such access (e.g., through compromised endpoints, insider threats, or weak physical security), they could harvest credentials that enable further attacks on network infrastructure. This could compromise network integrity and confidentiality, potentially leading to unauthorized configuration changes or data interception. Given the age of the vulnerability and the product versions affected, it is likely that most organizations have upgraded or replaced these versions; however, legacy systems in critical infrastructure or industrial environments might still be at risk. The impact is more significant in environments where strict network segmentation and access controls are not enforced, increasing the risk of lateral movement after initial compromise.

Mitigation Recommendations

Since no patches are available for this vulnerability, European organizations should focus on compensating controls. First, verify if any Cisco Resource Manager instances running versions 1.0 or 1.1 exist within the environment and prioritize their upgrade or decommissioning. If legacy systems must remain operational, restrict local access strictly to trusted administrators and implement strong physical and logical access controls. Change any exposed credentials immediately if there is suspicion of compromise. Additionally, review and harden file permissions on log and temporary files to ensure they are not world-readable. Employ host-based intrusion detection systems (HIDS) to monitor unauthorized access attempts to sensitive files. Network segmentation should be enforced to limit the spread of an attacker who gains local access. Finally, conduct regular audits and vulnerability assessments to detect any residual vulnerable systems.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df5b7

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 11:58:48 AM

Last updated: 8/6/2025, 11:32:34 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats