CVE-1999-1201: Windows 95 and Windows 98 systems, when configured with multiple TCP/IP stacks bound to the same MAC
Windows 95 and Windows 98 systems, when configured with multiple TCP/IP stacks bound to the same MAC address, allow remote attackers to cause a denial of service (traffic amplification) via a certain ICMP echo (ping) packet, which causes all stacks to send a ping response, aka TCP Chorusing.
AI Analysis
Technical Summary
CVE-1999-1201 is a medium-severity denial of service (DoS) vulnerability affecting Windows 95 and Windows 98 systems configured with multiple TCP/IP protocol stacks bound to the same MAC address. This configuration anomaly allows remote attackers to exploit the way these legacy operating systems handle ICMP echo (ping) packets. Specifically, when a crafted ICMP echo request is sent, each TCP/IP stack bound to the shared MAC address responds individually, resulting in amplified network traffic known as 'TCP Chorusing.' This amplification can overwhelm network resources or the targeted host, causing a denial of service. The vulnerability does not affect confidentiality or integrity but impacts availability by flooding the network or host with excessive ICMP echo replies. The vulnerability requires no authentication and can be triggered remotely over the network. There is no patch available for this issue, and no known exploits are currently active in the wild. The CVSS score is 5.0, reflecting a medium severity with network attack vector, low attack complexity, no authentication required, and impact limited to availability.
Potential Impact
For European organizations, the practical impact of this vulnerability today is minimal due to the obsolescence of Windows 95 and Windows 98 systems in modern enterprise environments. However, any legacy systems still in operation, particularly in industrial control systems, embedded devices, or isolated legacy networks, could be susceptible to denial of service attacks that disrupt network availability. Such disruptions could affect critical business operations, especially in sectors relying on legacy infrastructure. Additionally, the amplification effect could be leveraged as part of a larger distributed denial of service (DDoS) attack if legacy systems are accessible from the internet or internal networks. Given the lack of patches and the age of the vulnerability, organizations should prioritize decommissioning or isolating affected systems to mitigate risk.
Mitigation Recommendations
Since no patch is available for CVE-1999-1201, mitigation must focus on network and configuration controls. Organizations should: 1) Identify and inventory any legacy Windows 95 or Windows 98 systems, especially those configured with multiple TCP/IP stacks bound to the same MAC address. 2) Disable or remove redundant TCP/IP stacks to prevent multiple bindings to the same MAC address. 3) Isolate legacy systems from critical network segments and the internet using network segmentation and firewalls to prevent remote exploitation. 4) Implement ingress and egress filtering on network devices to block suspicious ICMP echo requests from untrusted sources. 5) Monitor network traffic for unusual ICMP amplification patterns indicative of exploitation attempts. 6) Plan and execute migration strategies to replace legacy systems with supported, secure operating systems to eliminate exposure to this and other legacy vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-1999-1201: Windows 95 and Windows 98 systems, when configured with multiple TCP/IP stacks bound to the same MAC
Description
Windows 95 and Windows 98 systems, when configured with multiple TCP/IP stacks bound to the same MAC address, allow remote attackers to cause a denial of service (traffic amplification) via a certain ICMP echo (ping) packet, which causes all stacks to send a ping response, aka TCP Chorusing.
AI-Powered Analysis
Technical Analysis
CVE-1999-1201 is a medium-severity denial of service (DoS) vulnerability affecting Windows 95 and Windows 98 systems configured with multiple TCP/IP protocol stacks bound to the same MAC address. This configuration anomaly allows remote attackers to exploit the way these legacy operating systems handle ICMP echo (ping) packets. Specifically, when a crafted ICMP echo request is sent, each TCP/IP stack bound to the shared MAC address responds individually, resulting in amplified network traffic known as 'TCP Chorusing.' This amplification can overwhelm network resources or the targeted host, causing a denial of service. The vulnerability does not affect confidentiality or integrity but impacts availability by flooding the network or host with excessive ICMP echo replies. The vulnerability requires no authentication and can be triggered remotely over the network. There is no patch available for this issue, and no known exploits are currently active in the wild. The CVSS score is 5.0, reflecting a medium severity with network attack vector, low attack complexity, no authentication required, and impact limited to availability.
Potential Impact
For European organizations, the practical impact of this vulnerability today is minimal due to the obsolescence of Windows 95 and Windows 98 systems in modern enterprise environments. However, any legacy systems still in operation, particularly in industrial control systems, embedded devices, or isolated legacy networks, could be susceptible to denial of service attacks that disrupt network availability. Such disruptions could affect critical business operations, especially in sectors relying on legacy infrastructure. Additionally, the amplification effect could be leveraged as part of a larger distributed denial of service (DDoS) attack if legacy systems are accessible from the internet or internal networks. Given the lack of patches and the age of the vulnerability, organizations should prioritize decommissioning or isolating affected systems to mitigate risk.
Mitigation Recommendations
Since no patch is available for CVE-1999-1201, mitigation must focus on network and configuration controls. Organizations should: 1) Identify and inventory any legacy Windows 95 or Windows 98 systems, especially those configured with multiple TCP/IP stacks bound to the same MAC address. 2) Disable or remove redundant TCP/IP stacks to prevent multiple bindings to the same MAC address. 3) Isolate legacy systems from critical network segments and the internet using network segmentation and firewalls to prevent remote exploitation. 4) Implement ingress and egress filtering on network devices to block suspicious ICMP echo requests from untrusted sources. 5) Monitor network traffic for unusual ICMP amplification patterns indicative of exploitation attempts. 6) Plan and execute migration strategies to replace legacy systems with supported, secure operating systems to eliminate exposure to this and other legacy vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32bb6fd31d6ed7dedf7
Added to database: 5/20/2025, 3:43:39 PM
Last enriched: 7/1/2025, 7:55:18 PM
Last updated: 7/31/2025, 2:10:31 PM
Views: 13
Related Threats
CVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumCVE-2025-8464: CWE-23 Relative Path Traversal in glenwpcoder Drag and Drop Multiple File Upload for Contact Form 7
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.