Skip to main content

CVE-1999-1104: Windows 95 uses weak encryption for the password list (.pwl) file used when password caching is enab

Medium
VulnerabilityCVE-1999-1104cve-1999-1104
Published: Fri Dec 31 1999 (12/31/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_95

Description

Windows 95 uses weak encryption for the password list (.pwl) file used when password caching is enabled, which allows local users to gain privileges by decrypting the passwords.

AI-Powered Analysis

AILast updated: 07/01/2025, 11:56:47 UTC

Technical Analysis

CVE-1999-1104 is a vulnerability found in Microsoft Windows 95, where the password list file (.pwl), used for caching user passwords locally, employs weak encryption. This weak encryption allows local users with access to the system to decrypt the cached passwords, potentially escalating their privileges. The vulnerability arises because the encryption algorithm used for the .pwl file is easily reversible, enabling attackers to retrieve plaintext passwords without requiring network access or advanced exploitation techniques. Since the vulnerability is local and does not require authentication, any user with physical or local access to the Windows 95 machine can exploit this weakness. The vulnerability affects the confidentiality, integrity, and availability of user credentials and potentially the system itself if privilege escalation is achieved. Given the age of Windows 95 and the lack of patch availability, this vulnerability remains unmitigated in affected systems. The CVSS score of 4.6 (medium severity) reflects the limited attack vector (local access) but acknowledges the potential impact on confidentiality, integrity, and availability. Exploitation does not require user interaction beyond local access, and the scope is limited to systems running Windows 95 with password caching enabled.

Potential Impact

For European organizations, the direct impact of this vulnerability is minimal in modern contexts, as Windows 95 is an obsolete operating system no longer in use in professional environments. However, legacy systems or industrial control systems that might still run Windows 95 could be at risk. If such systems are present, attackers with local access could decrypt cached passwords, leading to unauthorized privilege escalation and potential lateral movement within the network. This could compromise sensitive data or disrupt operations. The vulnerability undermines the confidentiality of user credentials and could lead to integrity and availability issues if attackers gain administrative control. Given the local access requirement, the threat is primarily from insiders or attackers with physical access. European organizations with legacy infrastructure should be aware of this risk, especially in sectors where legacy systems persist, such as manufacturing or critical infrastructure.

Mitigation Recommendations

Since no patch is available for this vulnerability, mitigation must focus on compensating controls. Organizations should: 1) Identify and inventory any legacy Windows 95 systems in their environment and plan for their upgrade or decommissioning. 2) Disable password caching on Windows 95 systems if they must remain operational. 3) Restrict physical and local access to legacy systems to trusted personnel only, implementing strict access controls and monitoring. 4) Employ network segmentation to isolate legacy systems from critical network segments to limit potential lateral movement. 5) Use strong endpoint security controls and monitoring to detect unauthorized access attempts. 6) Consider replacing legacy systems with modern, supported operating systems that have robust security features and receive regular updates. 7) Educate staff about the risks of legacy systems and enforce policies to minimize their use.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df5d6

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 11:56:47 AM

Last updated: 7/28/2025, 7:35:40 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats