Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1088: Vulnerability in chsh command in HP-UX 9.X through 10.20 allows local users to gain privileges.

0
High
VulnerabilityCVE-1999-1088cve-1999-1088
Published: Thu Jan 09 1997 (01/09/1997, 05:00:00 UTC)
Source: NVD
Vendor/Project: hp
Product: hp-ux

Description

Vulnerability in chsh command in HP-UX 9.X through 10.20 allows local users to gain privileges.

AI-Powered Analysis

AILast updated: 07/01/2025, 12:25:58 UTC

Technical Analysis

CVE-1999-1088 is a high-severity local privilege escalation vulnerability affecting the chsh (change shell) command in HP-UX versions 9.X through 10.20. The chsh command is used to change a user's login shell. In these affected HP-UX versions, a flaw in the implementation of chsh allows local users without prior elevated privileges to gain unauthorized root-level access. The vulnerability arises because the chsh command does not properly validate or restrict the operations it performs when changing the shell, enabling a local attacker to escalate privileges by exploiting this weakness. The CVSS v2 score of 7.2 reflects a high impact on confidentiality, integrity, and availability, with the attack vector being local (AV:L), low attack complexity (AC:L), no authentication required (Au:N), and complete compromise of system security (C:C/I:C/A:C). Although this vulnerability was published in 1997 and no patches are available, it remains relevant for legacy HP-UX systems still in operation. No known exploits in the wild have been reported, but the vulnerability's nature makes it a critical risk for any environment where untrusted local users have access to affected HP-UX systems.

Potential Impact

For European organizations still operating legacy HP-UX systems within the affected versions, this vulnerability poses a significant risk. Successful exploitation allows any local user to gain root privileges, effectively compromising the entire system. This can lead to unauthorized access to sensitive data, modification or deletion of critical files, and disruption of services. In sectors such as finance, manufacturing, telecommunications, and government agencies where HP-UX systems may still be in use, the impact could be severe, including data breaches, operational downtime, and regulatory non-compliance. Given the local attack vector, the threat is primarily from insider threats or attackers who have already gained limited access. However, once exploited, the attacker gains full control, which could be leveraged to pivot to other networked systems, amplifying the impact across the organization.

Mitigation Recommendations

Since no official patches are available for this vulnerability, European organizations should take a multi-layered approach to mitigation: 1) Restrict local access strictly to trusted personnel only, minimizing the number of users with shell access on affected HP-UX systems. 2) Implement strong user account management and monitoring to detect any unusual attempts to invoke chsh or escalate privileges. 3) Employ mandatory access controls (MAC) or enhanced security modules if supported by the HP-UX version to limit the capabilities of local users. 4) Consider migrating critical workloads off legacy HP-UX systems to supported platforms with active security updates. 5) Use host-based intrusion detection systems (HIDS) to monitor for suspicious activity related to privilege escalation attempts. 6) Regularly audit system configurations and user privileges to ensure no unauthorized changes have occurred. 7) If possible, disable or restrict the chsh command usage through system policies or by replacing it with a secure wrapper that validates inputs and user permissions.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de627

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 12:25:58 PM

Last updated: 2/4/2026, 5:29:37 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats