CVE-1999-1162: Vulnerability in passwd in SCO UNIX 4.0 and earlier allows attackers to cause a denial of service by
Vulnerability in passwd in SCO UNIX 4.0 and earlier allows attackers to cause a denial of service by preventing users from being able to log into the system.
AI Analysis
Technical Summary
CVE-1999-1162 is a vulnerability found in the passwd utility of SCO UNIX 4.0 and earlier versions, specifically affecting the open_desktop product versions 1.1 and 2.0. The passwd command is a critical system utility used to change user passwords and manage authentication credentials. This vulnerability allows an unauthenticated remote attacker to cause a denial of service (DoS) condition by exploiting flaws in the passwd utility, which results in preventing legitimate users from logging into the system. The vulnerability does not impact confidentiality but affects both integrity and availability, as it can disrupt user authentication processes and potentially corrupt or block password changes. The CVSS score of 6.4 (medium severity) reflects that the attack vector is network-based with low attack complexity and no authentication required, making exploitation feasible without user interaction. However, no patch is available for this vulnerability, and there are no known exploits in the wild. Given the age of the affected systems (SCO UNIX 4.0 and earlier, published in 1993), this vulnerability primarily concerns legacy systems that may still be in operation in niche or industrial environments. The lack of patches and the critical role of the passwd utility in system access make this vulnerability a notable risk for affected systems.
Potential Impact
For European organizations, the impact of this vulnerability is primarily operational. Organizations still running legacy SCO UNIX systems with the affected passwd versions risk complete denial of service for user authentication, effectively locking out users and administrators. This can halt critical business operations, especially in industrial control systems, legacy financial systems, or other environments where SCO UNIX remains in use. Although the vulnerability does not expose sensitive data directly, the inability to log in can lead to extended downtime, loss of productivity, and potential cascading failures in dependent systems. The absence of patches means organizations must rely on compensating controls or system upgrades. Given the medium severity and network attack vector, attackers with network access could disrupt services remotely, increasing the risk for organizations with exposed legacy systems.
Mitigation Recommendations
Since no official patch is available, European organizations should prioritize the following mitigations: 1) Identify and inventory all SCO UNIX systems running affected versions of open_desktop passwd utility. 2) Isolate these legacy systems from untrusted networks to reduce exposure to remote attacks, employing network segmentation and strict firewall rules. 3) Implement strict access controls and monitoring to detect unusual authentication failures or attempts to exploit the passwd utility. 4) Where feasible, plan and execute migration strategies to modern, supported operating systems to eliminate the vulnerability entirely. 5) If migration is not immediately possible, consider deploying compensating controls such as multi-factor authentication at network gateways or VPNs to limit access to vulnerable systems. 6) Regularly back up critical system configurations and user data to enable rapid recovery in case of denial of service. 7) Educate system administrators on the risks and signs of exploitation attempts related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-1999-1162: Vulnerability in passwd in SCO UNIX 4.0 and earlier allows attackers to cause a denial of service by
Description
Vulnerability in passwd in SCO UNIX 4.0 and earlier allows attackers to cause a denial of service by preventing users from being able to log into the system.
AI-Powered Analysis
Technical Analysis
CVE-1999-1162 is a vulnerability found in the passwd utility of SCO UNIX 4.0 and earlier versions, specifically affecting the open_desktop product versions 1.1 and 2.0. The passwd command is a critical system utility used to change user passwords and manage authentication credentials. This vulnerability allows an unauthenticated remote attacker to cause a denial of service (DoS) condition by exploiting flaws in the passwd utility, which results in preventing legitimate users from logging into the system. The vulnerability does not impact confidentiality but affects both integrity and availability, as it can disrupt user authentication processes and potentially corrupt or block password changes. The CVSS score of 6.4 (medium severity) reflects that the attack vector is network-based with low attack complexity and no authentication required, making exploitation feasible without user interaction. However, no patch is available for this vulnerability, and there are no known exploits in the wild. Given the age of the affected systems (SCO UNIX 4.0 and earlier, published in 1993), this vulnerability primarily concerns legacy systems that may still be in operation in niche or industrial environments. The lack of patches and the critical role of the passwd utility in system access make this vulnerability a notable risk for affected systems.
Potential Impact
For European organizations, the impact of this vulnerability is primarily operational. Organizations still running legacy SCO UNIX systems with the affected passwd versions risk complete denial of service for user authentication, effectively locking out users and administrators. This can halt critical business operations, especially in industrial control systems, legacy financial systems, or other environments where SCO UNIX remains in use. Although the vulnerability does not expose sensitive data directly, the inability to log in can lead to extended downtime, loss of productivity, and potential cascading failures in dependent systems. The absence of patches means organizations must rely on compensating controls or system upgrades. Given the medium severity and network attack vector, attackers with network access could disrupt services remotely, increasing the risk for organizations with exposed legacy systems.
Mitigation Recommendations
Since no official patch is available, European organizations should prioritize the following mitigations: 1) Identify and inventory all SCO UNIX systems running affected versions of open_desktop passwd utility. 2) Isolate these legacy systems from untrusted networks to reduce exposure to remote attacks, employing network segmentation and strict firewall rules. 3) Implement strict access controls and monitoring to detect unusual authentication failures or attempts to exploit the passwd utility. 4) Where feasible, plan and execute migration strategies to modern, supported operating systems to eliminate the vulnerability entirely. 5) If migration is not immediately possible, consider deploying compensating controls such as multi-factor authentication at network gateways or VPNs to limit access to vulnerable systems. 6) Regularly back up critical system configurations and user data to enable rapid recovery in case of denial of service. 7) Educate system administrators on the risks and signs of exploitation attempts related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32ab6fd31d6ed7de3f7
Added to database: 5/20/2025, 3:43:38 PM
Last enriched: 7/2/2025, 2:56:53 AM
Last updated: 8/15/2025, 5:29:47 AM
Views: 12
Related Threats
CVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-9119: Cross Site Scripting in Netis WF2419
MediumCVE-2025-55590: n/a
MediumCVE-2025-55589: n/a
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.