Skip to main content

CVE-1999-1152: Compaq/Microcom 6000 Access Integrator does not disconnect a client after a certain number of failed

High
VulnerabilityCVE-1999-1152cve-1999-1152rcecwe-307
Published: Wed Jun 03 1998 (06/03/1998, 04:00:00 UTC)
Source: NVD
Vendor/Project: compaq
Product: microcom_6000_firmware

Description

Compaq/Microcom 6000 Access Integrator does not disconnect a client after a certain number of failed login attempts, which allows remote attackers to guess usernames or passwords via a brute force attack.

AI-Powered Analysis

AILast updated: 06/29/2025, 22:40:35 UTC

Technical Analysis

CVE-1999-1152 is a vulnerability found in the Compaq/Microcom 6000 Access Integrator firmware. The core issue is that the system does not disconnect a client after multiple failed login attempts. This lack of enforcement on login attempt limits allows remote attackers to perform brute force attacks to guess valid usernames or passwords. Since the system does not lock out or disconnect clients after repeated failures, attackers can continuously attempt credential guesses without interruption. The vulnerability is classified under CWE-307, which relates to improper restriction of excessive authentication attempts. The CVSS 3.1 base score is 7.5 (high severity), with an attack vector of network (remote), low attack complexity, no privileges required, and no user interaction needed. The impact is primarily on confidentiality, as successful brute forcing can lead to unauthorized access to the system. There is no indication of impact on integrity or availability. No patches are available for this vulnerability, and no known exploits have been reported in the wild. The affected product is a legacy firmware for Compaq/Microcom 6000 Access Integrator, a device used historically for network access integration and management. Given the age of the vulnerability (published in 1998), it is likely that affected systems are legacy or out of service in many environments, but some industrial or specialized networks may still use them.

Potential Impact

For European organizations, the primary impact of this vulnerability is unauthorized access due to brute force attacks on network access devices running the vulnerable firmware. If exploited, attackers could gain access to network management interfaces or sensitive network infrastructure components, potentially leading to further lateral movement or data exposure. Confidentiality is at risk as attackers may obtain valid credentials. Although there is no direct impact on system integrity or availability, unauthorized access can lead to indirect consequences such as configuration changes or data leakage. Organizations in sectors with legacy infrastructure, such as industrial control systems, telecommunications, or government networks, may be more vulnerable if these devices remain in use. The lack of patch availability means organizations must rely on compensating controls. The threat is heightened by the fact that no authentication or user interaction is required to attempt exploitation, making remote brute force attacks feasible over the network.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement compensating controls to mitigate this vulnerability. These include: 1) Network segmentation and isolation of legacy Compaq/Microcom 6000 Access Integrator devices to restrict access only to trusted management networks. 2) Deployment of intrusion detection/prevention systems (IDS/IPS) to monitor and block repeated failed login attempts or brute force patterns targeting these devices. 3) Implementation of strong password policies and use of complex, non-default credentials to reduce the likelihood of successful brute force attacks. 4) Use of VPNs or secure tunnels with multi-factor authentication for remote access to these devices to add an additional layer of authentication. 5) Regular auditing and monitoring of login attempts and access logs to detect suspicious activity early. 6) Where possible, replacement or upgrade of legacy devices to modern, supported hardware and firmware that include brute force protections and account lockout mechanisms. 7) Limiting network exposure of these devices by firewall rules to only allow management access from specific IP addresses or subnets.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7de9d5

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/29/2025, 10:40:35 PM

Last updated: 8/15/2025, 5:02:56 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats