Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1264: WebRamp M3 router does not disable remote telnet or HTTP access to itself, even when access has been

0
High
VulnerabilityCVE-1999-1264cve-1999-1264
Published: Thu Jan 21 1999 (01/21/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: ramp_networks
Product: webramp

Description

WebRamp M3 router does not disable remote telnet or HTTP access to itself, even when access has been explicitly disabled.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 06/28/2025, 14:56:48 UTC

Technical Analysis

CVE-1999-1264 is a high-severity vulnerability affecting the WebRamp M3 series routers (including versions 300, M3, M3i, and M3t) produced by Ramp Networks. The core issue is that these routers do not properly disable remote Telnet or HTTP access even when such access has been explicitly disabled by the administrator. This means that despite configuration settings intended to restrict remote management interfaces, attackers can still connect remotely via Telnet or HTTP protocols without any authentication or access control barriers. The vulnerability is network exploitable (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L). It impacts confidentiality, integrity, and availability (C:P/I:P/A:P), allowing attackers to potentially gain unauthorized administrative access to the router. Given the router’s role as a network gateway device, exploitation could lead to interception or manipulation of network traffic, unauthorized configuration changes, or denial of service. No patches or fixes are available for this vulnerability, and there are no known exploits in the wild documented. However, the inherent design flaw presents a significant risk if these devices are still in use and exposed to untrusted networks. Since the vulnerability dates back to 1999, it is likely that affected devices are legacy hardware, but organizations relying on such equipment remain vulnerable to remote compromise due to this persistent access control failure.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial if WebRamp M3 routers are still deployed within their network infrastructure. Unauthorized remote access to routers can lead to full compromise of network perimeter defenses, enabling attackers to intercept sensitive communications, redirect traffic, or launch further attacks against internal systems. This could result in data breaches affecting confidentiality, disruption of business operations through denial of service, and loss of integrity of network configurations. Critical infrastructure operators, government agencies, and enterprises with legacy network equipment are particularly at risk. The absence of patches means organizations must rely on compensating controls or device replacement to mitigate risk. Given the high CVSS score of 7.5, the threat is significant, especially in environments where these routers are accessible from untrusted networks or the internet.

Mitigation Recommendations

Since no official patches or firmware updates are available for this vulnerability, European organizations should take immediate practical steps to mitigate risk: 1) Identify and inventory all WebRamp M3 series routers in their environment to assess exposure. 2) Physically isolate or segment these devices on trusted internal networks, ensuring they are not accessible from untrusted external networks or the internet. 3) Implement strict network access controls such as firewall rules to block inbound Telnet (port 23) and HTTP (port 80) traffic to these routers from unauthorized sources. 4) Where possible, replace affected routers with modern, supported devices that provide robust access control and security features. 5) Monitor network traffic for unusual access attempts to these routers and maintain logs for forensic analysis. 6) Employ network intrusion detection/prevention systems (IDS/IPS) to detect and block attempts to exploit this vulnerability. 7) Educate network administrators about the risks of legacy equipment and enforce policies to phase out unsupported hardware. These targeted measures go beyond generic advice by focusing on compensating controls and device replacement strategies specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Threat ID: 682ca32bb6fd31d6ed7ded98

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/28/2025, 2:56:48 PM

Last updated: 3/24/2026, 10:50:24 PM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses