CVE-1999-1201: Windows 95 and Windows 98 systems, when configured with multiple TCP/IP stacks bound to the same MAC
Windows 95 and Windows 98 systems, when configured with multiple TCP/IP stacks bound to the same MAC address, allow remote attackers to cause a denial of service (traffic amplification) via a certain ICMP echo (ping) packet, which causes all stacks to send a ping response, aka TCP Chorusing.
AI Analysis
Technical Summary
CVE-1999-1201 is a medium-severity denial of service (DoS) vulnerability affecting Windows 95 and Windows 98 systems configured with multiple TCP/IP protocol stacks bound to the same MAC address. This configuration anomaly allows remote attackers to exploit the way these legacy operating systems handle ICMP echo (ping) packets. Specifically, when a crafted ICMP echo request is sent, each TCP/IP stack bound to the shared MAC address responds individually, resulting in amplified network traffic known as 'TCP Chorusing.' This amplification can overwhelm network resources or the targeted host, causing a denial of service. The vulnerability does not affect confidentiality or integrity but impacts availability by flooding the network or host with excessive ICMP echo replies. The vulnerability requires no authentication and can be triggered remotely over the network. There is no patch available for this issue, and no known exploits are currently active in the wild. The CVSS score is 5.0, reflecting a medium severity with network attack vector, low attack complexity, no authentication required, and impact limited to availability.
Potential Impact
For European organizations, the practical impact of this vulnerability today is minimal due to the obsolescence of Windows 95 and Windows 98 systems in modern enterprise environments. However, any legacy systems still in operation, particularly in industrial control systems, embedded devices, or isolated legacy networks, could be susceptible to denial of service attacks that disrupt network availability. Such disruptions could affect critical business operations, especially in sectors relying on legacy infrastructure. Additionally, the amplification effect could be leveraged as part of a larger distributed denial of service (DDoS) attack if legacy systems are accessible from the internet or internal networks. Given the lack of patches and the age of the vulnerability, organizations should prioritize decommissioning or isolating affected systems to mitigate risk.
Mitigation Recommendations
Since no patch is available for CVE-1999-1201, mitigation must focus on network and configuration controls. Organizations should: 1) Identify and inventory any legacy Windows 95 or Windows 98 systems, especially those configured with multiple TCP/IP stacks bound to the same MAC address. 2) Disable or remove redundant TCP/IP stacks to prevent multiple bindings to the same MAC address. 3) Isolate legacy systems from critical network segments and the internet using network segmentation and firewalls to prevent remote exploitation. 4) Implement ingress and egress filtering on network devices to block suspicious ICMP echo requests from untrusted sources. 5) Monitor network traffic for unusual ICMP amplification patterns indicative of exploitation attempts. 6) Plan and execute migration strategies to replace legacy systems with supported, secure operating systems to eliminate exposure to this and other legacy vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-1999-1201: Windows 95 and Windows 98 systems, when configured with multiple TCP/IP stacks bound to the same MAC
Description
Windows 95 and Windows 98 systems, when configured with multiple TCP/IP stacks bound to the same MAC address, allow remote attackers to cause a denial of service (traffic amplification) via a certain ICMP echo (ping) packet, which causes all stacks to send a ping response, aka TCP Chorusing.
AI-Powered Analysis
Technical Analysis
CVE-1999-1201 is a medium-severity denial of service (DoS) vulnerability affecting Windows 95 and Windows 98 systems configured with multiple TCP/IP protocol stacks bound to the same MAC address. This configuration anomaly allows remote attackers to exploit the way these legacy operating systems handle ICMP echo (ping) packets. Specifically, when a crafted ICMP echo request is sent, each TCP/IP stack bound to the shared MAC address responds individually, resulting in amplified network traffic known as 'TCP Chorusing.' This amplification can overwhelm network resources or the targeted host, causing a denial of service. The vulnerability does not affect confidentiality or integrity but impacts availability by flooding the network or host with excessive ICMP echo replies. The vulnerability requires no authentication and can be triggered remotely over the network. There is no patch available for this issue, and no known exploits are currently active in the wild. The CVSS score is 5.0, reflecting a medium severity with network attack vector, low attack complexity, no authentication required, and impact limited to availability.
Potential Impact
For European organizations, the practical impact of this vulnerability today is minimal due to the obsolescence of Windows 95 and Windows 98 systems in modern enterprise environments. However, any legacy systems still in operation, particularly in industrial control systems, embedded devices, or isolated legacy networks, could be susceptible to denial of service attacks that disrupt network availability. Such disruptions could affect critical business operations, especially in sectors relying on legacy infrastructure. Additionally, the amplification effect could be leveraged as part of a larger distributed denial of service (DDoS) attack if legacy systems are accessible from the internet or internal networks. Given the lack of patches and the age of the vulnerability, organizations should prioritize decommissioning or isolating affected systems to mitigate risk.
Mitigation Recommendations
Since no patch is available for CVE-1999-1201, mitigation must focus on network and configuration controls. Organizations should: 1) Identify and inventory any legacy Windows 95 or Windows 98 systems, especially those configured with multiple TCP/IP stacks bound to the same MAC address. 2) Disable or remove redundant TCP/IP stacks to prevent multiple bindings to the same MAC address. 3) Isolate legacy systems from critical network segments and the internet using network segmentation and firewalls to prevent remote exploitation. 4) Implement ingress and egress filtering on network devices to block suspicious ICMP echo requests from untrusted sources. 5) Monitor network traffic for unusual ICMP amplification patterns indicative of exploitation attempts. 6) Plan and execute migration strategies to replace legacy systems with supported, secure operating systems to eliminate exposure to this and other legacy vulnerabilities.
Affected Countries
Threat ID: 682ca32bb6fd31d6ed7dedf7
Added to database: 5/20/2025, 3:43:39 PM
Last enriched: 7/1/2025, 7:55:18 PM
Last updated: 2/4/2026, 6:25:55 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25532: CWE-191: Integer Underflow (Wrap or Wraparound) in espressif esp-idf
MediumCVE-2026-25508: CWE-125: Out-of-bounds Read in espressif esp-idf
MediumCVE-2026-25507: CWE-416: Use After Free in espressif esp-idf
MediumCVE-2026-23624: CWE-384: Session Fixation in glpi-project glpi
MediumCVE-2026-22247: CWE-918: Server-Side Request Forgery (SSRF) in glpi-project glpi
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.