CVE-1999-1325: SAS System 5.18 on VAX/VMS is installed with insecure permissions for its directories and startup fi
SAS System 5.18 on VAX/VMS is installed with insecure permissions for its directories and startup file, which allows local users to gain privileges.
AI Analysis
Technical Summary
CVE-1999-1325 is a high-severity vulnerability affecting SAS System version 5.18 running on the VAX/VMS operating system. The core issue stems from insecure permissions set on the software's directories and startup files. These improper permissions allow local users—those with access to the system—to escalate their privileges. Specifically, because the directories and startup files are not adequately protected, a local attacker can modify or replace these files to execute arbitrary code with elevated privileges. The vulnerability is classified with a CVSS score of 7.2, indicating a high impact on confidentiality, integrity, and availability. The attack vector is local (AV:L), meaning exploitation requires local access to the system. The attack complexity is low (AC:L), no authentication is required (Au:N), and successful exploitation can lead to complete compromise of the system's confidentiality, integrity, and availability (C:C/I:C/A:C). There is no patch available for this vulnerability, and no known exploits have been reported in the wild. Given the age of the vulnerability (published in 1999) and the legacy nature of the VAX/VMS platform, this issue primarily affects environments still running this outdated combination, which are typically found in niche or legacy industrial, research, or governmental systems.
Potential Impact
For European organizations, the impact of this vulnerability depends heavily on the presence of legacy VAX/VMS systems running SAS System 5.18. Organizations in sectors such as research institutions, industrial control systems, or government agencies that maintain legacy infrastructure might be at risk. Exploitation allows local attackers to gain full control over affected systems, potentially leading to unauthorized data access, data manipulation, or disruption of critical services. This could result in loss of sensitive information, operational downtime, and damage to organizational reputation. Given the local access requirement, the threat is more significant in environments where multiple users have access to the same system or where insider threats exist. The lack of available patches means that mitigation relies on compensating controls. While the vulnerability is high severity, its practical impact in Europe is limited by the rarity of the affected platform and software combination in modern deployments.
Mitigation Recommendations
Since no patch is available for this vulnerability, European organizations should focus on the following specific mitigation strategies: 1) Conduct an inventory to identify any VAX/VMS systems running SAS System 5.18, prioritizing systems with multi-user access. 2) Restrict local access to these systems strictly to trusted administrators and users with a legitimate need. 3) Manually review and harden file and directory permissions for SAS System directories and startup files to ensure only authorized users have write or modify permissions. 4) Implement monitoring and auditing on these files and directories to detect unauthorized changes promptly. 5) Where possible, isolate legacy VAX/VMS systems from broader network access to limit exposure. 6) Consider migrating critical workloads off legacy platforms to supported and actively maintained systems. 7) Educate local users about the risks of privilege escalation and enforce strong access control policies. These targeted actions go beyond generic advice by focusing on the unique constraints of legacy VAX/VMS environments and the absence of vendor patches.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Switzerland
CVE-1999-1325: SAS System 5.18 on VAX/VMS is installed with insecure permissions for its directories and startup fi
Description
SAS System 5.18 on VAX/VMS is installed with insecure permissions for its directories and startup file, which allows local users to gain privileges.
AI-Powered Analysis
Technical Analysis
CVE-1999-1325 is a high-severity vulnerability affecting SAS System version 5.18 running on the VAX/VMS operating system. The core issue stems from insecure permissions set on the software's directories and startup files. These improper permissions allow local users—those with access to the system—to escalate their privileges. Specifically, because the directories and startup files are not adequately protected, a local attacker can modify or replace these files to execute arbitrary code with elevated privileges. The vulnerability is classified with a CVSS score of 7.2, indicating a high impact on confidentiality, integrity, and availability. The attack vector is local (AV:L), meaning exploitation requires local access to the system. The attack complexity is low (AC:L), no authentication is required (Au:N), and successful exploitation can lead to complete compromise of the system's confidentiality, integrity, and availability (C:C/I:C/A:C). There is no patch available for this vulnerability, and no known exploits have been reported in the wild. Given the age of the vulnerability (published in 1999) and the legacy nature of the VAX/VMS platform, this issue primarily affects environments still running this outdated combination, which are typically found in niche or legacy industrial, research, or governmental systems.
Potential Impact
For European organizations, the impact of this vulnerability depends heavily on the presence of legacy VAX/VMS systems running SAS System 5.18. Organizations in sectors such as research institutions, industrial control systems, or government agencies that maintain legacy infrastructure might be at risk. Exploitation allows local attackers to gain full control over affected systems, potentially leading to unauthorized data access, data manipulation, or disruption of critical services. This could result in loss of sensitive information, operational downtime, and damage to organizational reputation. Given the local access requirement, the threat is more significant in environments where multiple users have access to the same system or where insider threats exist. The lack of available patches means that mitigation relies on compensating controls. While the vulnerability is high severity, its practical impact in Europe is limited by the rarity of the affected platform and software combination in modern deployments.
Mitigation Recommendations
Since no patch is available for this vulnerability, European organizations should focus on the following specific mitigation strategies: 1) Conduct an inventory to identify any VAX/VMS systems running SAS System 5.18, prioritizing systems with multi-user access. 2) Restrict local access to these systems strictly to trusted administrators and users with a legitimate need. 3) Manually review and harden file and directory permissions for SAS System directories and startup files to ensure only authorized users have write or modify permissions. 4) Implement monitoring and auditing on these files and directories to detect unauthorized changes promptly. 5) Where possible, isolate legacy VAX/VMS systems from broader network access to limit exposure. 6) Consider migrating critical workloads off legacy platforms to supported and actively maintained systems. 7) Educate local users about the risks of privilege escalation and enforce strong access control policies. These targeted actions go beyond generic advice by focusing on the unique constraints of legacy VAX/VMS environments and the absence of vendor patches.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32db6fd31d6ed7df633
Added to database: 5/20/2025, 3:43:41 PM
Last enriched: 6/25/2025, 4:38:22 PM
Last updated: 8/14/2025, 12:41:49 AM
Views: 14
Related Threats
CVE-2025-8361: CWE-962 Missing Authorization in Drupal Config Pages
HighCVE-2025-8092: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Drupal COOKiES Consent Management
HighCVE-2025-49897: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in gopiplus Vertical scroll slideshow gallery v2
HighCVE-2025-24975: CWE-754: Improper Check for Unusual or Exceptional Conditions in FirebirdSQL firebird
HighCVE-2025-5048: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Autodesk AutoCAD
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.