CVE-1999-1300: Vulnerability in accton in Cray UNICOS 6.1 and 6.0 allows local users to read arbitrary files and mo
Vulnerability in accton in Cray UNICOS 6.1 and 6.0 allows local users to read arbitrary files and modify system accounting configuration.
AI Analysis
Technical Summary
CVE-1999-1300 is a vulnerability identified in the 'accton' utility of Cray UNICOS versions 6.0 and 6.1. This vulnerability allows local users to read arbitrary files and modify system accounting configurations. The 'accton' command is typically used to enable or disable process accounting on UNIX systems, which tracks system resource usage for auditing and billing purposes. Exploitation of this vulnerability requires local access to the system, meaning an attacker must already have some level of access or user account on the affected Cray supercomputer running UNICOS 6.0 or 6.1. The vulnerability permits unauthorized reading of arbitrary files, potentially exposing sensitive information, and unauthorized modification of system accounting settings, which could be used to cover tracks or manipulate system usage data. The CVSS score of 3.6 (low severity) reflects that the attack vector is local (AV:L), with low attack complexity (AC:L), no authentication required (Au:N), partial confidentiality (C:P) and integrity (I:P) impact, and no availability impact (A:N). No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the vulnerability (published in 1999) and the specialized nature of Cray UNICOS systems, this vulnerability is primarily relevant to legacy supercomputing environments still running these versions.
Potential Impact
For European organizations, the impact of this vulnerability is generally limited due to the niche and legacy nature of the affected systems. Cray UNICOS 6.0 and 6.1 are specialized operating systems used primarily in high-performance computing (HPC) environments such as research institutions, universities, and government labs. If such organizations in Europe operate Cray supercomputers with these versions, the vulnerability could lead to unauthorized local users accessing sensitive files and altering accounting data, potentially undermining audit trails and data confidentiality. This could affect research data integrity and compliance with data protection regulations such as GDPR if sensitive personal or proprietary data is exposed. However, the requirement for local access and the absence of remote exploitation vectors reduce the likelihood of widespread impact. Additionally, the lack of available patches means organizations must rely on compensating controls to mitigate risk. Overall, the impact is moderate in environments where these systems remain operational and accessed by multiple users.
Mitigation Recommendations
Given the absence of patches, European organizations should implement strict access controls to limit local user access to Cray UNICOS 6.0 and 6.1 systems. This includes enforcing strong authentication mechanisms, minimizing the number of users with shell or local access, and employing role-based access controls to restrict use of the 'accton' utility. Monitoring and auditing local user activities can help detect unauthorized attempts to read files or modify accounting configurations. Network segmentation and isolation of HPC systems can reduce the risk of unauthorized local access. Additionally, organizations should consider upgrading or migrating to supported operating system versions or alternative HPC platforms that receive security updates. If migration is not feasible, deploying host-based intrusion detection systems (HIDS) to monitor critical system files and accounting configurations can provide early warning of exploitation attempts. Regular backups of system configurations and accounting data will aid recovery in case of tampering.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Switzerland
CVE-1999-1300: Vulnerability in accton in Cray UNICOS 6.1 and 6.0 allows local users to read arbitrary files and mo
Description
Vulnerability in accton in Cray UNICOS 6.1 and 6.0 allows local users to read arbitrary files and modify system accounting configuration.
AI-Powered Analysis
Technical Analysis
CVE-1999-1300 is a vulnerability identified in the 'accton' utility of Cray UNICOS versions 6.0 and 6.1. This vulnerability allows local users to read arbitrary files and modify system accounting configurations. The 'accton' command is typically used to enable or disable process accounting on UNIX systems, which tracks system resource usage for auditing and billing purposes. Exploitation of this vulnerability requires local access to the system, meaning an attacker must already have some level of access or user account on the affected Cray supercomputer running UNICOS 6.0 or 6.1. The vulnerability permits unauthorized reading of arbitrary files, potentially exposing sensitive information, and unauthorized modification of system accounting settings, which could be used to cover tracks or manipulate system usage data. The CVSS score of 3.6 (low severity) reflects that the attack vector is local (AV:L), with low attack complexity (AC:L), no authentication required (Au:N), partial confidentiality (C:P) and integrity (I:P) impact, and no availability impact (A:N). No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the vulnerability (published in 1999) and the specialized nature of Cray UNICOS systems, this vulnerability is primarily relevant to legacy supercomputing environments still running these versions.
Potential Impact
For European organizations, the impact of this vulnerability is generally limited due to the niche and legacy nature of the affected systems. Cray UNICOS 6.0 and 6.1 are specialized operating systems used primarily in high-performance computing (HPC) environments such as research institutions, universities, and government labs. If such organizations in Europe operate Cray supercomputers with these versions, the vulnerability could lead to unauthorized local users accessing sensitive files and altering accounting data, potentially undermining audit trails and data confidentiality. This could affect research data integrity and compliance with data protection regulations such as GDPR if sensitive personal or proprietary data is exposed. However, the requirement for local access and the absence of remote exploitation vectors reduce the likelihood of widespread impact. Additionally, the lack of available patches means organizations must rely on compensating controls to mitigate risk. Overall, the impact is moderate in environments where these systems remain operational and accessed by multiple users.
Mitigation Recommendations
Given the absence of patches, European organizations should implement strict access controls to limit local user access to Cray UNICOS 6.0 and 6.1 systems. This includes enforcing strong authentication mechanisms, minimizing the number of users with shell or local access, and employing role-based access controls to restrict use of the 'accton' utility. Monitoring and auditing local user activities can help detect unauthorized attempts to read files or modify accounting configurations. Network segmentation and isolation of HPC systems can reduce the risk of unauthorized local access. Additionally, organizations should consider upgrading or migrating to supported operating system versions or alternative HPC platforms that receive security updates. If migration is not feasible, deploying host-based intrusion detection systems (HIDS) to monitor critical system files and accounting configurations can provide early warning of exploitation attempts. Regular backups of system configurations and accounting data will aid recovery in case of tampering.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32db6fd31d6ed7df625
Added to database: 5/20/2025, 3:43:41 PM
Last enriched: 7/1/2025, 11:28:14 AM
Last updated: 7/26/2025, 1:45:02 AM
Views: 11
Related Threats
CVE-2025-53857: CWE-862: Missing Authorization in Mattermost Mattermost Confluence Plugin
LowCVE-2025-49221: CWE-862: Missing Authorization in Mattermost Mattermost Confluence Plugin
LowCVE-2025-38213
LowCVE-2025-8774: Observable Timing Discrepancy in riscv-boom SonicBOOM
LowVulnerability Management Program - How to implement SLA and its processes
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.