Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1254: Windows 95, 98, and NT 4.0 allow remote attackers to cause a denial of service by spoofing ICMP redi

0
Medium
VulnerabilityCVE-1999-1254cve-1999-1254denial of service
Published: Mon Mar 08 1999 (03/08/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: windows_95

Description

Windows 95, 98, and NT 4.0 allow remote attackers to cause a denial of service by spoofing ICMP redirect messages from a router, which causes Windows to change its routing tables.

AI-Powered Analysis

AILast updated: 07/01/2025, 19:11:39 UTC

Technical Analysis

CVE-1999-1254 is a vulnerability affecting legacy Microsoft Windows operating systems, specifically Windows 95, Windows 98, and Windows NT 4.0. The flaw arises from the way these systems handle ICMP (Internet Control Message Protocol) redirect messages. ICMP redirects are used by routers to inform hosts of a more efficient route for sending packets. However, in these affected Windows versions, an attacker can spoof ICMP redirect messages, causing the target system to modify its routing tables incorrectly. This manipulation can lead to a denial of service (DoS) condition by disrupting normal network traffic flow, potentially isolating the system from network resources or causing traffic to be misrouted. The vulnerability does not impact confidentiality or integrity directly but affects availability by impairing network connectivity. The CVSS score is 5.0 (medium severity), with an attack vector of network (remote), low attack complexity, no authentication required, and no impact on confidentiality or integrity, only availability. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the affected systems, this vulnerability is largely of historical interest, as these operating systems are obsolete and unsupported. However, in legacy environments where these systems might still be in use, the risk remains relevant. The exploitation requires the attacker to send spoofed ICMP redirect packets to the target, which is feasible in many network scenarios, especially if the attacker is on the same local network or can route packets to the victim. The vulnerability stems from insufficient validation of ICMP redirect messages by the affected Windows TCP/IP stack, allowing unauthorized route changes.

Potential Impact

For European organizations, the direct impact of this vulnerability today is minimal due to the obsolescence of Windows 95, 98, and NT 4.0 in modern enterprise environments. However, in niche legacy systems or industrial control environments where such outdated systems might still be operational, exploitation could cause network outages or loss of connectivity, disrupting business operations. This could affect availability of critical services relying on these legacy systems. Additionally, if these systems are part of a larger network infrastructure, manipulated routing tables could be leveraged to facilitate further network attacks or traffic interception. The lack of patch availability means organizations cannot remediate the vulnerability through updates, increasing the importance of network-level controls. The vulnerability does not compromise data confidentiality or integrity directly but can cause denial of service conditions that impact operational continuity.

Mitigation Recommendations

Given the absence of patches, mitigation must focus on network-level controls and configuration changes. Organizations should implement ingress and egress filtering to block spoofed ICMP redirect messages from untrusted sources, especially on network segments hosting legacy systems. Network devices such as routers and firewalls should be configured to drop ICMP redirect packets or to only accept them from trusted routers. Segmentation of legacy systems into isolated network zones with strict access controls can reduce exposure. Monitoring network traffic for unusual ICMP redirect activity can help detect attempted exploitation. Where feasible, organizations should plan to phase out or upgrade legacy Windows 95, 98, and NT 4.0 systems to supported operating systems that do not exhibit this vulnerability. If legacy systems must remain, consider using virtualized environments or network proxies to shield them from direct network exposure. Documenting and enforcing strict network policies around ICMP traffic is critical to prevent exploitation.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7deee3

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 7:11:39 PM

Last updated: 2/7/2026, 12:28:18 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats