CVE-1999-1254: Windows 95, 98, and NT 4.0 allow remote attackers to cause a denial of service by spoofing ICMP redi
Windows 95, 98, and NT 4.0 allow remote attackers to cause a denial of service by spoofing ICMP redirect messages from a router, which causes Windows to change its routing tables.
AI Analysis
Technical Summary
CVE-1999-1254 is a vulnerability affecting legacy Microsoft Windows operating systems, specifically Windows 95, Windows 98, and Windows NT 4.0. The flaw arises from the way these systems handle ICMP (Internet Control Message Protocol) redirect messages. ICMP redirects are used by routers to inform hosts of a more efficient route for sending packets. However, in these affected Windows versions, an attacker can spoof ICMP redirect messages, causing the target system to modify its routing tables incorrectly. This manipulation can lead to a denial of service (DoS) condition by disrupting normal network traffic flow, potentially isolating the system from network resources or causing traffic to be misrouted. The vulnerability does not impact confidentiality or integrity directly but affects availability by impairing network connectivity. The CVSS score is 5.0 (medium severity), with an attack vector of network (remote), low attack complexity, no authentication required, and no impact on confidentiality or integrity, only availability. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the affected systems, this vulnerability is largely of historical interest, as these operating systems are obsolete and unsupported. However, in legacy environments where these systems might still be in use, the risk remains relevant. The exploitation requires the attacker to send spoofed ICMP redirect packets to the target, which is feasible in many network scenarios, especially if the attacker is on the same local network or can route packets to the victim. The vulnerability stems from insufficient validation of ICMP redirect messages by the affected Windows TCP/IP stack, allowing unauthorized route changes.
Potential Impact
For European organizations, the direct impact of this vulnerability today is minimal due to the obsolescence of Windows 95, 98, and NT 4.0 in modern enterprise environments. However, in niche legacy systems or industrial control environments where such outdated systems might still be operational, exploitation could cause network outages or loss of connectivity, disrupting business operations. This could affect availability of critical services relying on these legacy systems. Additionally, if these systems are part of a larger network infrastructure, manipulated routing tables could be leveraged to facilitate further network attacks or traffic interception. The lack of patch availability means organizations cannot remediate the vulnerability through updates, increasing the importance of network-level controls. The vulnerability does not compromise data confidentiality or integrity directly but can cause denial of service conditions that impact operational continuity.
Mitigation Recommendations
Given the absence of patches, mitigation must focus on network-level controls and configuration changes. Organizations should implement ingress and egress filtering to block spoofed ICMP redirect messages from untrusted sources, especially on network segments hosting legacy systems. Network devices such as routers and firewalls should be configured to drop ICMP redirect packets or to only accept them from trusted routers. Segmentation of legacy systems into isolated network zones with strict access controls can reduce exposure. Monitoring network traffic for unusual ICMP redirect activity can help detect attempted exploitation. Where feasible, organizations should plan to phase out or upgrade legacy Windows 95, 98, and NT 4.0 systems to supported operating systems that do not exhibit this vulnerability. If legacy systems must remain, consider using virtualized environments or network proxies to shield them from direct network exposure. Documenting and enforcing strict network policies around ICMP traffic is critical to prevent exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-1999-1254: Windows 95, 98, and NT 4.0 allow remote attackers to cause a denial of service by spoofing ICMP redi
Description
Windows 95, 98, and NT 4.0 allow remote attackers to cause a denial of service by spoofing ICMP redirect messages from a router, which causes Windows to change its routing tables.
AI-Powered Analysis
Technical Analysis
CVE-1999-1254 is a vulnerability affecting legacy Microsoft Windows operating systems, specifically Windows 95, Windows 98, and Windows NT 4.0. The flaw arises from the way these systems handle ICMP (Internet Control Message Protocol) redirect messages. ICMP redirects are used by routers to inform hosts of a more efficient route for sending packets. However, in these affected Windows versions, an attacker can spoof ICMP redirect messages, causing the target system to modify its routing tables incorrectly. This manipulation can lead to a denial of service (DoS) condition by disrupting normal network traffic flow, potentially isolating the system from network resources or causing traffic to be misrouted. The vulnerability does not impact confidentiality or integrity directly but affects availability by impairing network connectivity. The CVSS score is 5.0 (medium severity), with an attack vector of network (remote), low attack complexity, no authentication required, and no impact on confidentiality or integrity, only availability. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the affected systems, this vulnerability is largely of historical interest, as these operating systems are obsolete and unsupported. However, in legacy environments where these systems might still be in use, the risk remains relevant. The exploitation requires the attacker to send spoofed ICMP redirect packets to the target, which is feasible in many network scenarios, especially if the attacker is on the same local network or can route packets to the victim. The vulnerability stems from insufficient validation of ICMP redirect messages by the affected Windows TCP/IP stack, allowing unauthorized route changes.
Potential Impact
For European organizations, the direct impact of this vulnerability today is minimal due to the obsolescence of Windows 95, 98, and NT 4.0 in modern enterprise environments. However, in niche legacy systems or industrial control environments where such outdated systems might still be operational, exploitation could cause network outages or loss of connectivity, disrupting business operations. This could affect availability of critical services relying on these legacy systems. Additionally, if these systems are part of a larger network infrastructure, manipulated routing tables could be leveraged to facilitate further network attacks or traffic interception. The lack of patch availability means organizations cannot remediate the vulnerability through updates, increasing the importance of network-level controls. The vulnerability does not compromise data confidentiality or integrity directly but can cause denial of service conditions that impact operational continuity.
Mitigation Recommendations
Given the absence of patches, mitigation must focus on network-level controls and configuration changes. Organizations should implement ingress and egress filtering to block spoofed ICMP redirect messages from untrusted sources, especially on network segments hosting legacy systems. Network devices such as routers and firewalls should be configured to drop ICMP redirect packets or to only accept them from trusted routers. Segmentation of legacy systems into isolated network zones with strict access controls can reduce exposure. Monitoring network traffic for unusual ICMP redirect activity can help detect attempted exploitation. Where feasible, organizations should plan to phase out or upgrade legacy Windows 95, 98, and NT 4.0 systems to supported operating systems that do not exhibit this vulnerability. If legacy systems must remain, consider using virtualized environments or network proxies to shield them from direct network exposure. Documenting and enforcing strict network policies around ICMP traffic is critical to prevent exploitation.
Affected Countries
Threat ID: 682ca32bb6fd31d6ed7deee3
Added to database: 5/20/2025, 3:43:39 PM
Last enriched: 7/1/2025, 7:11:39 PM
Last updated: 2/7/2026, 12:28:18 PM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.