Skip to main content

CVE-1999-1090: The default configuration of NCSA Telnet package for Macintosh and PC enables FTP, even though it do

High
VulnerabilityCVE-1999-1090cve-1999-1090
Published: Tue Sep 10 1991 (09/10/1991, 04:00:00 UTC)
Source: NVD
Vendor/Project: ncsa
Product: telnet

Description

The default configuration of NCSA Telnet package for Macintosh and PC enables FTP, even though it does not include an "ftp=yes" line, which allows remote attackers to read and modify arbitrary files.

AI-Powered Analysis

AILast updated: 07/01/2025, 18:10:34 UTC

Technical Analysis

CVE-1999-1090 is a high-severity vulnerability found in the default configuration of the NCSA Telnet package for Macintosh and PC systems. Although the configuration file does not explicitly include an "ftp=yes" directive, the FTP service is nonetheless enabled by default. This misconfiguration allows remote attackers to exploit the FTP functionality to read and modify arbitrary files on the affected system without authentication. The vulnerability arises because the Telnet package inadvertently exposes FTP capabilities, which can be accessed remotely over the network. The impact includes unauthorized disclosure of sensitive files (confidentiality breach), unauthorized modification of files (integrity breach), and potentially disruption of system operations (availability impact). The CVSS v2 score of 7.5 reflects the network vector (AV:N), low attack complexity (AC:L), no authentication required (Au:N), and partial to complete impact on confidentiality, integrity, and availability (C:P/I:P/A:P). This vulnerability dates back to 1991 and affects legacy systems running the NCSA Telnet package, which is largely obsolete today. No patches are available, and there are no known exploits in the wild currently documented. However, the vulnerability remains a concern for any legacy environments still operating this software, especially if exposed to untrusted networks.

Potential Impact

For European organizations, the impact of this vulnerability is primarily relevant to legacy systems still running the NCSA Telnet package on Macintosh or PC platforms. If such systems are connected to corporate or public networks, attackers could remotely access and manipulate critical files, leading to data breaches, operational disruptions, and potential compliance violations under regulations such as GDPR. The ability to modify files remotely without authentication could allow attackers to implant malware, alter configurations, or exfiltrate sensitive information. Although modern systems have largely replaced NCSA Telnet, some industrial, research, or governmental environments may still use legacy setups, making them vulnerable. The lack of available patches means organizations must rely on compensating controls to mitigate risk. The threat is less relevant to organizations that have fully migrated to modern, supported remote access solutions. However, any overlooked legacy infrastructure could be a weak point in the security posture.

Mitigation Recommendations

Given the absence of patches, European organizations should take the following specific steps: 1) Identify and inventory all systems running the NCSA Telnet package, especially legacy Macintosh and PC systems. 2) Immediately isolate these systems from untrusted networks, including the internet and less secure internal segments. 3) Disable or remove the NCSA Telnet package where possible, replacing it with modern, secure remote access tools that support encrypted protocols such as SSH. 4) If removal is not feasible, implement strict network-level controls such as firewall rules to block FTP and Telnet traffic to and from these systems. 5) Monitor network traffic for unusual FTP activity originating from or targeting these legacy systems. 6) Employ host-based intrusion detection systems to detect unauthorized file access or modifications. 7) Educate IT staff about the risks of legacy software and enforce policies to prevent its use in production environments. 8) Consider network segmentation to limit the blast radius if these systems are compromised. These targeted mitigations go beyond generic advice by focusing on legacy system identification, network isolation, and compensating controls.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de3a4

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 6:10:34 PM

Last updated: 8/17/2025, 1:26:32 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats