Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1135: Vulnerability in VUE 3.0 in HP 9.x allows local users to gain root privileges, as fixed by PHSS_4994

0
High
VulnerabilityCVE-1999-1135cve-1999-1135
Published: Wed Apr 20 1994 (04/20/1994, 04:00:00 UTC)
Source: NVD
Vendor/Project: hp
Product: hp-ux

Description

Vulnerability in VUE 3.0 in HP 9.x allows local users to gain root privileges, as fixed by PHSS_4994 and PHSS_5438.

AI-Powered Analysis

AILast updated: 07/01/2025, 17:09:42 UTC

Technical Analysis

CVE-1999-1135 is a high-severity local privilege escalation vulnerability affecting VUE 3.0 running on HP-UX version 9.x. The vulnerability allows a local user to gain root privileges by exploiting a flaw in the VUE 3.0 component. This escalation occurs without requiring prior authentication, meaning any local user with access to the system can potentially exploit this vulnerability to obtain full administrative control. The vulnerability was addressed by HP through patches PHSS_4994 and PHSS_5438, which remedied the underlying security flaw. The Common Vulnerability Scoring System (CVSS) score of 7.2 reflects the significant impact on confidentiality, integrity, and availability, combined with relatively low attack complexity and no authentication requirement. Although the vulnerability is historical, dating back to 1994, and affects an outdated operating system version, it remains relevant for legacy systems still in operation. Exploitation would allow an attacker to fully compromise the system, potentially leading to unauthorized data access, system manipulation, and disruption of services.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the presence of legacy HP-UX 9.x systems running VUE 3.0. Organizations in sectors such as manufacturing, telecommunications, or critical infrastructure that historically used HP-UX may still have these systems in operation. Exploitation would allow local attackers or insiders to escalate privileges to root, leading to complete system compromise. This could result in unauthorized access to sensitive data, disruption of critical services, and potential lateral movement within the network. Given the age of the vulnerability, it is less likely to be exploited in modern environments, but legacy systems without proper patching or isolation remain at risk. The lack of known exploits in the wild reduces immediate threat levels, but the high severity score indicates that if exploited, the consequences would be severe.

Mitigation Recommendations

Mitigation should focus on the following specific actions: 1) Identify and inventory all HP-UX 9.x systems running VUE 3.0 within the organization. 2) Apply the official HP patches PHSS_4994 and PHSS_5438 immediately to remediate the vulnerability. If patches cannot be applied due to system constraints, consider isolating affected systems from untrusted users and networks to limit local access. 3) Implement strict access controls and monitoring on legacy systems to detect and prevent unauthorized local access. 4) Where possible, plan and execute migration strategies to newer, supported operating system versions to eliminate exposure to this and other legacy vulnerabilities. 5) Conduct regular security audits and user privilege reviews on legacy systems to minimize the risk of insider threats exploiting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de41c

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 5:09:42 PM

Last updated: 2/7/2026, 12:44:57 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats