CVE-1999-1254: Windows 95, 98, and NT 4.0 allow remote attackers to cause a denial of service by spoofing ICMP redi
Windows 95, 98, and NT 4.0 allow remote attackers to cause a denial of service by spoofing ICMP redirect messages from a router, which causes Windows to change its routing tables.
AI Analysis
Technical Summary
CVE-1999-1254 is a vulnerability affecting legacy Microsoft Windows operating systems, specifically Windows 95, Windows 98, and Windows NT 4.0. The flaw arises from the way these systems handle ICMP (Internet Control Message Protocol) redirect messages. ICMP redirects are used by routers to inform hosts of a more efficient route for sending packets. However, in these affected Windows versions, an attacker can spoof ICMP redirect messages, causing the target system to modify its routing tables incorrectly. This manipulation can lead to a denial of service (DoS) condition by disrupting normal network traffic flow, potentially isolating the system from network resources or causing traffic to be misrouted. The vulnerability does not impact confidentiality or integrity directly but affects availability by impairing network connectivity. The CVSS score is 5.0 (medium severity), with an attack vector of network (remote), low attack complexity, no authentication required, and no impact on confidentiality or integrity, only availability. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the affected systems, this vulnerability is largely of historical interest, as these operating systems are obsolete and unsupported. However, in legacy environments where these systems might still be in use, the risk remains relevant. The exploitation requires the attacker to send spoofed ICMP redirect packets to the target, which is feasible in many network scenarios, especially if the attacker is on the same local network or can route packets to the victim. The vulnerability stems from insufficient validation of ICMP redirect messages by the affected Windows TCP/IP stack, allowing unauthorized route changes.
Potential Impact
For European organizations, the direct impact of this vulnerability today is minimal due to the obsolescence of Windows 95, 98, and NT 4.0 in modern enterprise environments. However, in niche legacy systems or industrial control environments where such outdated systems might still be operational, exploitation could cause network outages or loss of connectivity, disrupting business operations. This could affect availability of critical services relying on these legacy systems. Additionally, if these systems are part of a larger network infrastructure, manipulated routing tables could be leveraged to facilitate further network attacks or traffic interception. The lack of patch availability means organizations cannot remediate the vulnerability through updates, increasing the importance of network-level controls. The vulnerability does not compromise data confidentiality or integrity directly but can cause denial of service conditions that impact operational continuity.
Mitigation Recommendations
Given the absence of patches, mitigation must focus on network-level controls and configuration changes. Organizations should implement ingress and egress filtering to block spoofed ICMP redirect messages from untrusted sources, especially on network segments hosting legacy systems. Network devices such as routers and firewalls should be configured to drop ICMP redirect packets or to only accept them from trusted routers. Segmentation of legacy systems into isolated network zones with strict access controls can reduce exposure. Monitoring network traffic for unusual ICMP redirect activity can help detect attempted exploitation. Where feasible, organizations should plan to phase out or upgrade legacy Windows 95, 98, and NT 4.0 systems to supported operating systems that do not exhibit this vulnerability. If legacy systems must remain, consider using virtualized environments or network proxies to shield them from direct network exposure. Documenting and enforcing strict network policies around ICMP traffic is critical to prevent exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-1999-1254: Windows 95, 98, and NT 4.0 allow remote attackers to cause a denial of service by spoofing ICMP redi
Description
Windows 95, 98, and NT 4.0 allow remote attackers to cause a denial of service by spoofing ICMP redirect messages from a router, which causes Windows to change its routing tables.
AI-Powered Analysis
Technical Analysis
CVE-1999-1254 is a vulnerability affecting legacy Microsoft Windows operating systems, specifically Windows 95, Windows 98, and Windows NT 4.0. The flaw arises from the way these systems handle ICMP (Internet Control Message Protocol) redirect messages. ICMP redirects are used by routers to inform hosts of a more efficient route for sending packets. However, in these affected Windows versions, an attacker can spoof ICMP redirect messages, causing the target system to modify its routing tables incorrectly. This manipulation can lead to a denial of service (DoS) condition by disrupting normal network traffic flow, potentially isolating the system from network resources or causing traffic to be misrouted. The vulnerability does not impact confidentiality or integrity directly but affects availability by impairing network connectivity. The CVSS score is 5.0 (medium severity), with an attack vector of network (remote), low attack complexity, no authentication required, and no impact on confidentiality or integrity, only availability. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the affected systems, this vulnerability is largely of historical interest, as these operating systems are obsolete and unsupported. However, in legacy environments where these systems might still be in use, the risk remains relevant. The exploitation requires the attacker to send spoofed ICMP redirect packets to the target, which is feasible in many network scenarios, especially if the attacker is on the same local network or can route packets to the victim. The vulnerability stems from insufficient validation of ICMP redirect messages by the affected Windows TCP/IP stack, allowing unauthorized route changes.
Potential Impact
For European organizations, the direct impact of this vulnerability today is minimal due to the obsolescence of Windows 95, 98, and NT 4.0 in modern enterprise environments. However, in niche legacy systems or industrial control environments where such outdated systems might still be operational, exploitation could cause network outages or loss of connectivity, disrupting business operations. This could affect availability of critical services relying on these legacy systems. Additionally, if these systems are part of a larger network infrastructure, manipulated routing tables could be leveraged to facilitate further network attacks or traffic interception. The lack of patch availability means organizations cannot remediate the vulnerability through updates, increasing the importance of network-level controls. The vulnerability does not compromise data confidentiality or integrity directly but can cause denial of service conditions that impact operational continuity.
Mitigation Recommendations
Given the absence of patches, mitigation must focus on network-level controls and configuration changes. Organizations should implement ingress and egress filtering to block spoofed ICMP redirect messages from untrusted sources, especially on network segments hosting legacy systems. Network devices such as routers and firewalls should be configured to drop ICMP redirect packets or to only accept them from trusted routers. Segmentation of legacy systems into isolated network zones with strict access controls can reduce exposure. Monitoring network traffic for unusual ICMP redirect activity can help detect attempted exploitation. Where feasible, organizations should plan to phase out or upgrade legacy Windows 95, 98, and NT 4.0 systems to supported operating systems that do not exhibit this vulnerability. If legacy systems must remain, consider using virtualized environments or network proxies to shield them from direct network exposure. Documenting and enforcing strict network policies around ICMP traffic is critical to prevent exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32bb6fd31d6ed7deee3
Added to database: 5/20/2025, 3:43:39 PM
Last enriched: 7/1/2025, 7:11:39 PM
Last updated: 7/28/2025, 8:43:55 AM
Views: 9
Related Threats
CVE-2025-55194: CWE-248: Uncaught Exception in Part-DB Part-DB-server
MediumCVE-2025-55197: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumCVE-2025-8929: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-8928: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-8927: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.