Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1090: The default configuration of NCSA Telnet package for Macintosh and PC enables FTP, even though it do

0
High
VulnerabilityCVE-1999-1090cve-1999-1090
Published: Tue Sep 10 1991 (09/10/1991, 04:00:00 UTC)
Source: NVD
Vendor/Project: ncsa
Product: telnet

Description

The default configuration of NCSA Telnet package for Macintosh and PC enables FTP, even though it does not include an "ftp=yes" line, which allows remote attackers to read and modify arbitrary files.

AI-Powered Analysis

AILast updated: 07/01/2025, 18:10:34 UTC

Technical Analysis

CVE-1999-1090 is a high-severity vulnerability found in the default configuration of the NCSA Telnet package for Macintosh and PC systems. Although the configuration file does not explicitly include an "ftp=yes" directive, the FTP service is nonetheless enabled by default. This misconfiguration allows remote attackers to exploit the FTP functionality to read and modify arbitrary files on the affected system without authentication. The vulnerability arises because the Telnet package inadvertently exposes FTP capabilities, which can be accessed remotely over the network. The impact includes unauthorized disclosure of sensitive files (confidentiality breach), unauthorized modification of files (integrity breach), and potentially disruption of system operations (availability impact). The CVSS v2 score of 7.5 reflects the network vector (AV:N), low attack complexity (AC:L), no authentication required (Au:N), and partial to complete impact on confidentiality, integrity, and availability (C:P/I:P/A:P). This vulnerability dates back to 1991 and affects legacy systems running the NCSA Telnet package, which is largely obsolete today. No patches are available, and there are no known exploits in the wild currently documented. However, the vulnerability remains a concern for any legacy environments still operating this software, especially if exposed to untrusted networks.

Potential Impact

For European organizations, the impact of this vulnerability is primarily relevant to legacy systems still running the NCSA Telnet package on Macintosh or PC platforms. If such systems are connected to corporate or public networks, attackers could remotely access and manipulate critical files, leading to data breaches, operational disruptions, and potential compliance violations under regulations such as GDPR. The ability to modify files remotely without authentication could allow attackers to implant malware, alter configurations, or exfiltrate sensitive information. Although modern systems have largely replaced NCSA Telnet, some industrial, research, or governmental environments may still use legacy setups, making them vulnerable. The lack of available patches means organizations must rely on compensating controls to mitigate risk. The threat is less relevant to organizations that have fully migrated to modern, supported remote access solutions. However, any overlooked legacy infrastructure could be a weak point in the security posture.

Mitigation Recommendations

Given the absence of patches, European organizations should take the following specific steps: 1) Identify and inventory all systems running the NCSA Telnet package, especially legacy Macintosh and PC systems. 2) Immediately isolate these systems from untrusted networks, including the internet and less secure internal segments. 3) Disable or remove the NCSA Telnet package where possible, replacing it with modern, secure remote access tools that support encrypted protocols such as SSH. 4) If removal is not feasible, implement strict network-level controls such as firewall rules to block FTP and Telnet traffic to and from these systems. 5) Monitor network traffic for unusual FTP activity originating from or targeting these legacy systems. 6) Employ host-based intrusion detection systems to detect unauthorized file access or modifications. 7) Educate IT staff about the risks of legacy software and enforce policies to prevent its use in production environments. 8) Consider network segmentation to limit the blast radius if these systems are compromised. These targeted mitigations go beyond generic advice by focusing on legacy system identification, network isolation, and compensating controls.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de3a4

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 6:10:34 PM

Last updated: 2/4/2026, 3:45:31 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats