Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1367: Internet Explorer 5.0 does not properly reset the username/password cache for Web sites that do not

0
Medium
VulnerabilityCVE-1999-1367cve-1999-1367
Published: Thu May 06 1999 (05/06/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: internet_explorer

Description

Internet Explorer 5.0 does not properly reset the username/password cache for Web sites that do not use standard cache controls, which could allow users on the same system to access restricted web sites that were visited by other users.

AI-Powered Analysis

AILast updated: 07/01/2025, 18:09:43 UTC

Technical Analysis

CVE-1999-1367 is a vulnerability affecting Microsoft Internet Explorer version 5.0, identified in 1999. The issue arises because Internet Explorer 5.0 does not properly reset the username and password cache for websites that do not implement standard cache control mechanisms. Specifically, when users visit web pages requiring authentication, Internet Explorer caches the credentials to facilitate seamless access. However, if the web server does not use standard HTTP cache control headers to prevent caching of sensitive authentication data, Internet Explorer fails to clear these cached credentials appropriately. This flaw can lead to a scenario where multiple users sharing the same system can access restricted web resources using cached credentials from previous sessions. The vulnerability primarily affects confidentiality and integrity, as unauthorized users on the same machine may gain access to protected web content without re-authentication. The CVSS score of 4.6 (medium severity) reflects that the attack vector is local (AV:L), requires low attack complexity (AC:L), no authentication (Au:N) is needed to exploit once local access is obtained, and impacts confidentiality, integrity, and availability to a partial degree (C:P/I:P/A:P). No patches are available, and no known exploits in the wild have been reported. Given the age of the vulnerability and the affected product version, this issue is largely historical but remains relevant in legacy environments where Internet Explorer 5.0 might still be in use.

Potential Impact

For European organizations, the impact of this vulnerability is primarily relevant in environments where legacy systems and outdated browsers like Internet Explorer 5.0 are still operational. The vulnerability could allow unauthorized users sharing the same workstation to access sensitive web applications or intranet sites without proper authentication, leading to potential data leakage or unauthorized actions within restricted web portals. This risk is heightened in shared workstation scenarios such as public access terminals, call centers, or organizations with limited endpoint management. Although modern browsers and updated systems have long mitigated this issue, organizations with legacy infrastructure may face confidentiality breaches and potential compliance issues under data protection regulations like GDPR if sensitive personal or corporate data is exposed. The vulnerability does not facilitate remote exploitation, limiting its impact to local threat actors or insiders with physical or remote desktop access to the affected machine.

Mitigation Recommendations

Given that no official patch is available for Internet Explorer 5.0, European organizations should prioritize the following mitigations: 1) Upgrade and migrate away from Internet Explorer 5.0 to modern, supported browsers that properly handle credential caching and adhere to current security standards. 2) Implement strict endpoint access controls and user session management to prevent unauthorized access to shared workstations, including enforcing user logoff and session timeouts. 3) Configure web servers to use appropriate cache control headers (e.g., 'Cache-Control: no-store, no-cache, must-revalidate') to prevent caching of authentication credentials on client browsers. 4) Employ endpoint security solutions that monitor and restrict credential caching behaviors or clear cached credentials upon session termination. 5) Educate users about the risks of shared workstation usage and encourage practices such as closing browsers and logging off after use. 6) For legacy systems that cannot be upgraded immediately, consider isolating them in secure network segments and restricting access to trusted personnel only.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7defc6

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 6:09:43 PM

Last updated: 2/4/2026, 3:46:33 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats