Skip to main content

CVE-1999-1300: Vulnerability in accton in Cray UNICOS 6.1 and 6.0 allows local users to read arbitrary files and mo

Low
VulnerabilityCVE-1999-1300cve-1999-1300
Published: Fri Dec 31 1999 (12/31/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: cray
Product: unicos

Description

Vulnerability in accton in Cray UNICOS 6.1 and 6.0 allows local users to read arbitrary files and modify system accounting configuration.

AI-Powered Analysis

AILast updated: 07/01/2025, 11:28:14 UTC

Technical Analysis

CVE-1999-1300 is a vulnerability identified in the 'accton' utility of Cray UNICOS versions 6.0 and 6.1. This vulnerability allows local users to read arbitrary files and modify system accounting configurations. The 'accton' command is typically used to enable or disable process accounting on UNIX systems, which tracks system resource usage for auditing and billing purposes. Exploitation of this vulnerability requires local access to the system, meaning an attacker must already have some level of access or user account on the affected Cray supercomputer running UNICOS 6.0 or 6.1. The vulnerability permits unauthorized reading of arbitrary files, potentially exposing sensitive information, and unauthorized modification of system accounting settings, which could be used to cover tracks or manipulate system usage data. The CVSS score of 3.6 (low severity) reflects that the attack vector is local (AV:L), with low attack complexity (AC:L), no authentication required (Au:N), partial confidentiality (C:P) and integrity (I:P) impact, and no availability impact (A:N). No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the vulnerability (published in 1999) and the specialized nature of Cray UNICOS systems, this vulnerability is primarily relevant to legacy supercomputing environments still running these versions.

Potential Impact

For European organizations, the impact of this vulnerability is generally limited due to the niche and legacy nature of the affected systems. Cray UNICOS 6.0 and 6.1 are specialized operating systems used primarily in high-performance computing (HPC) environments such as research institutions, universities, and government labs. If such organizations in Europe operate Cray supercomputers with these versions, the vulnerability could lead to unauthorized local users accessing sensitive files and altering accounting data, potentially undermining audit trails and data confidentiality. This could affect research data integrity and compliance with data protection regulations such as GDPR if sensitive personal or proprietary data is exposed. However, the requirement for local access and the absence of remote exploitation vectors reduce the likelihood of widespread impact. Additionally, the lack of available patches means organizations must rely on compensating controls to mitigate risk. Overall, the impact is moderate in environments where these systems remain operational and accessed by multiple users.

Mitigation Recommendations

Given the absence of patches, European organizations should implement strict access controls to limit local user access to Cray UNICOS 6.0 and 6.1 systems. This includes enforcing strong authentication mechanisms, minimizing the number of users with shell or local access, and employing role-based access controls to restrict use of the 'accton' utility. Monitoring and auditing local user activities can help detect unauthorized attempts to read files or modify accounting configurations. Network segmentation and isolation of HPC systems can reduce the risk of unauthorized local access. Additionally, organizations should consider upgrading or migrating to supported operating system versions or alternative HPC platforms that receive security updates. If migration is not feasible, deploying host-based intrusion detection systems (HIDS) to monitor critical system files and accounting configurations can provide early warning of exploitation attempts. Regular backups of system configurations and accounting data will aid recovery in case of tampering.

Need more detailed analysis?Get Pro

Threat ID: 682ca32db6fd31d6ed7df625

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 7/1/2025, 11:28:14 AM

Last updated: 7/26/2025, 1:45:02 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats