Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1159: SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without

0
Medium
VulnerabilityCVE-1999-1159cve-1999-1159
Published: Tue Dec 29 1998 (12/29/1998, 05:00:00 UTC)
Source: NVD
Vendor/Project: ssh
Product: ssh2

Description

SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root.

AI-Powered Analysis

AILast updated: 07/01/2025, 21:12:03 UTC

Technical Analysis

CVE-1999-1159 is a vulnerability affecting SSH version 2.0.11 and earlier, where local users are able to request remote port forwarding from privileged ports without requiring root privileges. Normally, binding to privileged ports (ports below 1024) requires elevated permissions to prevent unauthorized services from running on these ports. However, due to this flaw in SSH 2.0.11 and earlier, any local user can request remote forwarding from these privileged ports, potentially allowing them to redirect network traffic through the SSH server in an unauthorized manner. This can lead to unauthorized access or interception of network communications, as well as potential privilege escalation if the forwarded ports are used to access sensitive services. The vulnerability has a CVSS score of 4.6 (medium severity), indicating a moderate risk. The attack vector is local (AV:L), with low attack complexity (AC:L), no authentication required (Au:N), and impacts confidentiality, integrity, and availability (C:P/I:P/A:P). No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the vulnerability (published in 1998) and the affected version being SSH 2.0.11 and earlier, modern SSH implementations are unlikely to be affected. However, legacy systems still running these versions remain vulnerable. The vulnerability primarily affects systems where local user accounts exist and SSH 2.0.11 or earlier is in use, allowing local users to leverage the remote forwarding feature to bind privileged ports remotely without proper authorization.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the presence of legacy systems running SSH 2.0.11 or earlier. If such systems exist, local users (including potentially malicious insiders or compromised accounts) could exploit this vulnerability to redirect network traffic through privileged ports remotely, potentially bypassing network access controls or firewall rules. This could lead to unauthorized access to sensitive internal services, interception of confidential data, or disruption of service availability. The confidentiality, integrity, and availability of critical systems could be compromised. While the vulnerability requires local access, insider threats or attackers who have gained limited user access could leverage this flaw to escalate their capabilities. In environments with strict network segmentation and monitoring, this vulnerability could facilitate lateral movement or data exfiltration. However, given the age and limited scope of the vulnerability, the overall risk to modern European organizations is low unless legacy SSH versions are still in use on critical systems.

Mitigation Recommendations

1. Upgrade SSH to a modern, supported version: The most effective mitigation is to upgrade all SSH servers and clients to current, patched versions that do not contain this vulnerability. 2. Audit and decommission legacy systems: Identify any systems still running SSH 2.0.11 or earlier and either upgrade or retire them from production environments. 3. Restrict local user access: Limit the number of local user accounts on SSH servers, especially on legacy systems, to reduce the risk of exploitation. 4. Disable remote port forwarding if not required: Configure SSH server settings to disable remote port forwarding globally or for specific users to prevent misuse. 5. Implement strict network segmentation and monitoring: Monitor SSH traffic and network connections for unusual port forwarding activity, especially from privileged ports, and enforce network segmentation to limit lateral movement. 6. Use host-based access controls: Employ tools like SELinux or AppArmor to restrict SSH daemon capabilities and prevent unauthorized port binding. 7. Regularly review SSH configuration files (sshd_config) to ensure secure settings and disable legacy or insecure features.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7deb9e

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 9:12:03 PM

Last updated: 2/7/2026, 7:29:15 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats