Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1104: Windows 95 uses weak encryption for the password list (.pwl) file used when password caching is enab

0
Medium
VulnerabilityCVE-1999-1104cve-1999-1104
Published: Fri Dec 31 1999 (12/31/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_95

Description

Windows 95 uses weak encryption for the password list (.pwl) file used when password caching is enabled, which allows local users to gain privileges by decrypting the passwords.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 07/01/2025, 11:56:47 UTC

Technical Analysis

CVE-1999-1104 is a vulnerability found in Microsoft Windows 95, where the password list file (.pwl), used for caching user passwords locally, employs weak encryption. This weak encryption allows local users with access to the system to decrypt the cached passwords, potentially escalating their privileges. The vulnerability arises because the encryption algorithm used for the .pwl file is easily reversible, enabling attackers to retrieve plaintext passwords without requiring network access or advanced exploitation techniques. Since the vulnerability is local and does not require authentication, any user with physical or local access to the Windows 95 machine can exploit this weakness. The vulnerability affects the confidentiality, integrity, and availability of user credentials and potentially the system itself if privilege escalation is achieved. Given the age of Windows 95 and the lack of patch availability, this vulnerability remains unmitigated in affected systems. The CVSS score of 4.6 (medium severity) reflects the limited attack vector (local access) but acknowledges the potential impact on confidentiality, integrity, and availability. Exploitation does not require user interaction beyond local access, and the scope is limited to systems running Windows 95 with password caching enabled.

Potential Impact

For European organizations, the direct impact of this vulnerability is minimal in modern contexts, as Windows 95 is an obsolete operating system no longer in use in professional environments. However, legacy systems or industrial control systems that might still run Windows 95 could be at risk. If such systems are present, attackers with local access could decrypt cached passwords, leading to unauthorized privilege escalation and potential lateral movement within the network. This could compromise sensitive data or disrupt operations. The vulnerability undermines the confidentiality of user credentials and could lead to integrity and availability issues if attackers gain administrative control. Given the local access requirement, the threat is primarily from insiders or attackers with physical access. European organizations with legacy infrastructure should be aware of this risk, especially in sectors where legacy systems persist, such as manufacturing or critical infrastructure.

Mitigation Recommendations

Since no patch is available for this vulnerability, mitigation must focus on compensating controls. Organizations should: 1) Identify and inventory any legacy Windows 95 systems in their environment and plan for their upgrade or decommissioning. 2) Disable password caching on Windows 95 systems if they must remain operational. 3) Restrict physical and local access to legacy systems to trusted personnel only, implementing strict access controls and monitoring. 4) Employ network segmentation to isolate legacy systems from critical network segments to limit potential lateral movement. 5) Use strong endpoint security controls and monitoring to detect unauthorized access attempts. 6) Consider replacing legacy systems with modern, supported operating systems that have robust security features and receive regular updates. 7) Educate staff about the risks of legacy systems and enforce policies to minimize their use.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Threat ID: 682ca32cb6fd31d6ed7df5d6

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 11:56:47 AM

Last updated: 3/25/2026, 3:00:54 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses