Skip to main content

CVE-1999-1171: IPswitch WS_FTP allows local users to gain additional privileges and modify or add mail accounts by

Medium
VulnerabilityCVE-1999-1171cve-1999-1171
Published: Tue Feb 02 1999 (02/02/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: ipswitch
Product: imail

Description

IPswitch WS_FTP allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920.

AI-Powered Analysis

AILast updated: 07/01/2025, 19:55:53 UTC

Technical Analysis

CVE-1999-1171 is a medium-severity vulnerability affecting IPswitch WS_FTP's imail product versions 5.0, 1.0.1.e, and 1.0.2.e. The vulnerability allows local users to escalate their privileges by manipulating a specific registry key named "flags" and setting its value to 1920. This registry key modification enables the attacker to gain additional privileges within the system, specifically allowing them to modify or add mail accounts. Since the attack requires local access, it implies that an attacker must already have some level of access to the affected system to exploit this vulnerability. The CVSS vector (AV:L/AC:L/Au:N/C:P/I:P/A:P) indicates that the attack vector is local, with low attack complexity, no authentication required, and partial impact on confidentiality, integrity, and availability. However, the vulnerability does not have a patch available, and there are no known exploits in the wild, which suggests that while the vulnerability is known, it may not be actively exploited or may be difficult to exploit in practice. The vulnerability dates back to 1999, indicating that it affects legacy systems that may still be in use in some environments. The ability to modify or add mail accounts can lead to unauthorized access to sensitive communications, potential interception or redirection of emails, and further compromise of the affected environment.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on the continued use of legacy IPswitch WS_FTP imail versions. Organizations that still run these outdated versions risk local attackers escalating privileges to manipulate mail accounts, which could lead to unauthorized access to sensitive information, disruption of email services, and potential lateral movement within the network. This could affect confidentiality by exposing sensitive communications, integrity by allowing unauthorized modification of mail accounts, and availability if mail services are disrupted. Given the local access requirement, the threat is more significant in environments where multiple users have local system access, such as shared workstations or poorly segmented networks. In sectors like government, finance, and critical infrastructure within Europe, where email communications are vital and often sensitive, exploitation could have serious operational and reputational consequences. Additionally, the lack of a patch means organizations must rely on compensating controls to mitigate risk.

Mitigation Recommendations

Since no patch is available for this vulnerability, European organizations should focus on compensating controls and risk reduction strategies. First, restrict local access to systems running affected versions of IPswitch WS_FTP imail by enforcing strict access controls and user permissions. Implement network segmentation to isolate legacy systems and reduce the attack surface. Employ application whitelisting and endpoint protection to detect and prevent unauthorized registry modifications. Regularly audit and monitor registry keys, especially the "flags" key, for unauthorized changes. Consider migrating or upgrading to supported and patched versions of mail server software to eliminate exposure to this legacy vulnerability. Additionally, enforce strong physical security controls to prevent unauthorized local access. User education and awareness about the risks of local privilege escalation can further reduce the likelihood of exploitation. Finally, maintain comprehensive logging and alerting to detect suspicious activities related to mail account modifications.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7dedef

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 7:55:53 PM

Last updated: 8/15/2025, 8:44:53 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats