CVE-1999-1354: E-mail client in Softarc FirstClass Internet Server 5.506 and earlier stores usernames and passwords
E-mail client in Softarc FirstClass Internet Server 5.506 and earlier stores usernames and passwords in cleartext in the files (1) home.fc for version 5.506, (2) network.fc for version 3.5, or (3) FCCLIENT.LOG when logging is enabled.
AI Analysis
Technical Summary
CVE-1999-1354 is a vulnerability found in the e-mail client component of Softarc FirstClass Internet Server versions 5.506 and earlier. The core issue is that the client stores usernames and passwords in cleartext within local files on the user's system. Specifically, these credentials are stored in files named home.fc for version 5.506, network.fc for version 3.5, or FCCLIENT.LOG when logging is enabled. Because these files contain sensitive authentication data in an unencrypted form, any user or attacker with access to the local file system can easily retrieve these credentials. This vulnerability arises from poor credential management and lack of encryption or secure storage mechanisms. The CVSS score assigned is 4.6 (medium severity), with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no authentication required (Au:N), and partial impact on confidentiality, integrity, and availability (C:P/I:P/A:P). There is no patch available for this vulnerability, and no known exploits have been reported in the wild. Given the age of this vulnerability (published in 1999), it primarily affects legacy systems still running these outdated versions of the FirstClass Internet Server software. The vulnerability can lead to credential compromise, which in turn can allow unauthorized access to email accounts and potentially further internal systems if credentials are reused or if the attacker escalates privileges.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on whether legacy Softarc FirstClass Internet Server installations are still in use. If so, the exposure of cleartext credentials could lead to unauthorized access to corporate email accounts, resulting in potential data breaches, loss of sensitive communications, and further lateral movement within the network. This could compromise confidentiality and integrity of communications and potentially availability if attackers disrupt email services. Additionally, compromised credentials could be leveraged for phishing or social engineering attacks targeting European employees or partners. Although the vulnerability requires local access to the affected machine, insider threats or attackers who have gained initial footholds could exploit this to escalate access. The lack of patches means organizations must rely on compensating controls. Given the age of the vulnerability, it is less likely to affect modern environments but remains a risk in legacy or poorly maintained systems, which may still be present in some European institutions, especially in sectors with long technology refresh cycles such as government, education, or certain industries.
Mitigation Recommendations
Since no patch is available for this vulnerability, European organizations should focus on the following specific mitigations: 1) Identify and inventory any legacy Softarc FirstClass Internet Server installations and assess whether they are still in use. 2) If legacy systems are found, plan for immediate migration to modern, supported email platforms that implement secure credential storage. 3) Restrict local file system access on affected machines to trusted administrators only, minimizing the risk of unauthorized users reading the cleartext credential files. 4) Implement endpoint security controls such as file integrity monitoring to detect unauthorized access or modification of the credential files (home.fc, network.fc, FCCLIENT.LOG). 5) Enforce strong internal access controls and network segmentation to limit the ability of attackers to gain local access to vulnerable systems. 6) Educate users about the risks of credential reuse and encourage use of unique, strong passwords to limit the impact if credentials are compromised. 7) Monitor for unusual login activity or access patterns that could indicate credential compromise. 8) If logging is enabled, consider disabling or securing FCCLIENT.LOG files to prevent leakage of credentials. These steps go beyond generic advice by focusing on legacy system identification, access control hardening, and compensating controls tailored to the nature of this vulnerability.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Belgium, Sweden
CVE-1999-1354: E-mail client in Softarc FirstClass Internet Server 5.506 and earlier stores usernames and passwords
Description
E-mail client in Softarc FirstClass Internet Server 5.506 and earlier stores usernames and passwords in cleartext in the files (1) home.fc for version 5.506, (2) network.fc for version 3.5, or (3) FCCLIENT.LOG when logging is enabled.
AI-Powered Analysis
Technical Analysis
CVE-1999-1354 is a vulnerability found in the e-mail client component of Softarc FirstClass Internet Server versions 5.506 and earlier. The core issue is that the client stores usernames and passwords in cleartext within local files on the user's system. Specifically, these credentials are stored in files named home.fc for version 5.506, network.fc for version 3.5, or FCCLIENT.LOG when logging is enabled. Because these files contain sensitive authentication data in an unencrypted form, any user or attacker with access to the local file system can easily retrieve these credentials. This vulnerability arises from poor credential management and lack of encryption or secure storage mechanisms. The CVSS score assigned is 4.6 (medium severity), with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no authentication required (Au:N), and partial impact on confidentiality, integrity, and availability (C:P/I:P/A:P). There is no patch available for this vulnerability, and no known exploits have been reported in the wild. Given the age of this vulnerability (published in 1999), it primarily affects legacy systems still running these outdated versions of the FirstClass Internet Server software. The vulnerability can lead to credential compromise, which in turn can allow unauthorized access to email accounts and potentially further internal systems if credentials are reused or if the attacker escalates privileges.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on whether legacy Softarc FirstClass Internet Server installations are still in use. If so, the exposure of cleartext credentials could lead to unauthorized access to corporate email accounts, resulting in potential data breaches, loss of sensitive communications, and further lateral movement within the network. This could compromise confidentiality and integrity of communications and potentially availability if attackers disrupt email services. Additionally, compromised credentials could be leveraged for phishing or social engineering attacks targeting European employees or partners. Although the vulnerability requires local access to the affected machine, insider threats or attackers who have gained initial footholds could exploit this to escalate access. The lack of patches means organizations must rely on compensating controls. Given the age of the vulnerability, it is less likely to affect modern environments but remains a risk in legacy or poorly maintained systems, which may still be present in some European institutions, especially in sectors with long technology refresh cycles such as government, education, or certain industries.
Mitigation Recommendations
Since no patch is available for this vulnerability, European organizations should focus on the following specific mitigations: 1) Identify and inventory any legacy Softarc FirstClass Internet Server installations and assess whether they are still in use. 2) If legacy systems are found, plan for immediate migration to modern, supported email platforms that implement secure credential storage. 3) Restrict local file system access on affected machines to trusted administrators only, minimizing the risk of unauthorized users reading the cleartext credential files. 4) Implement endpoint security controls such as file integrity monitoring to detect unauthorized access or modification of the credential files (home.fc, network.fc, FCCLIENT.LOG). 5) Enforce strong internal access controls and network segmentation to limit the ability of attackers to gain local access to vulnerable systems. 6) Educate users about the risks of credential reuse and encourage use of unique, strong passwords to limit the impact if credentials are compromised. 7) Monitor for unusual login activity or access patterns that could indicate credential compromise. 8) If logging is enabled, consider disabling or securing FCCLIENT.LOG files to prevent leakage of credentials. These steps go beyond generic advice by focusing on legacy system identification, access control hardening, and compensating controls tailored to the nature of this vulnerability.
Affected Countries
Threat ID: 682ca32cb6fd31d6ed7df1e8
Added to database: 5/20/2025, 3:43:40 PM
Last enriched: 7/1/2025, 3:57:06 PM
Last updated: 2/7/2026, 12:04:53 PM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.