Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1084: The "AEDebug" registry key is installed with insecure permissions, which allows local users to modif

0
Medium
VulnerabilityCVE-1999-1084cve-1999-1084
Published: Fri Dec 31 1999 (12/31/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_nt

Description

The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash.

AI-Powered Analysis

AILast updated: 07/01/2025, 11:57:27 UTC

Technical Analysis

CVE-1999-1084 is a vulnerability affecting Microsoft Windows NT 4.0, specifically related to the "AEDebug" registry key. This registry key is installed with insecure permissions, allowing local users to modify it. The "AEDebug" key is used by the system to specify a debugger that is automatically launched when a system crash occurs. By altering this key, an attacker with local access can specify a malicious debugger, such as a Trojan Horse, which will then be executed with system-level privileges during a crash event. This effectively allows privilege escalation from a local user to potentially full system control. The vulnerability arises from improper access control on the registry key, which should be restricted to trusted system administrators only. The CVSS score of 4.6 (medium severity) reflects that exploitation requires local access but can impact confidentiality, integrity, and availability by allowing arbitrary code execution with elevated privileges. Although this vulnerability is relatively old and specific to Windows NT 4.0, it highlights the risks of insecure registry permissions and the importance of proper access control on critical system components. Microsoft has released patches addressing this issue, as documented in security bulletin MS00-008.

Potential Impact

For European organizations still operating legacy systems such as Windows NT 4.0—which is uncommon but possible in highly specialized industrial or embedded environments—this vulnerability could allow local attackers to gain elevated privileges and execute arbitrary code. This could lead to unauthorized access to sensitive data, disruption of critical services, or persistence of malware on affected systems. While modern Windows versions are not affected, organizations relying on legacy infrastructure in sectors like manufacturing, utilities, or government may face risks if these systems are connected to broader networks. The impact is primarily local privilege escalation, but the resulting control over the system could compromise confidentiality, integrity, and availability of critical data and services. Given the age of the vulnerability and the availability of patches, the threat is mitigated if systems are updated or isolated. However, unpatched legacy systems in European organizations could be vulnerable to insider threats or attackers who gain local access through other means.

Mitigation Recommendations

1. Apply the official Microsoft patch MS00-008 to all affected Windows NT 4.0 systems to correct the permissions on the "AEDebug" registry key. 2. Restrict physical and local access to legacy systems to trusted personnel only, minimizing the risk of local exploitation. 3. Audit registry permissions on critical keys to ensure they are not writable by non-administrative users. 4. Where possible, phase out Windows NT 4.0 systems and migrate to supported, modern operating systems with ongoing security updates. 5. Implement host-based intrusion detection systems (HIDS) to monitor for unauthorized changes to registry keys and suspicious debugger executions. 6. Use application whitelisting to prevent unauthorized executables, including malicious debuggers, from running on critical systems. 7. Conduct regular security training and awareness for staff managing legacy systems to recognize and prevent misuse.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7df5ca

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 11:57:27 AM

Last updated: 2/7/2026, 10:21:28 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats