Skip to main content

CVE-1999-1370: The setup wizard (ie5setup.exe) for Internet Explorer 5.0 disables (1) the screen saver, which could

High
VulnerabilityCVE-1999-1370cve-1999-1370
Published: Tue Mar 23 1999 (03/23/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: microsoft
Product: internet_explorer

Description

The setup wizard (ie5setup.exe) for Internet Explorer 5.0 disables (1) the screen saver, which could leave the system open to users with physical access if a failure occurs during an unattended installation, and (2) the Task Scheduler Service, which might prevent the scheduled execution of security-critical programs.

AI-Powered Analysis

AILast updated: 06/28/2025, 04:10:45 UTC

Technical Analysis

CVE-1999-1370 is a high-severity vulnerability affecting the setup wizard (ie5setup.exe) for Microsoft Internet Explorer version 5.0. The vulnerability arises because the setup process disables two critical system features: the screen saver and the Task Scheduler Service. Disabling the screen saver can leave a system vulnerable to unauthorized physical access if the installation process fails or is left unattended, as the screen saver often includes password protection to lock the system. Without this protection, an attacker with physical access could gain entry to the system. Additionally, disabling the Task Scheduler Service can prevent the execution of scheduled security-critical tasks such as automated virus scans, system updates, or other maintenance routines that rely on scheduled execution. This could degrade the overall security posture of the affected system by delaying or preventing important security operations. The vulnerability does not require network access to exploit (attack vector: local), requires low attack complexity, and no authentication, but it does require physical or local access to the machine. The impact on confidentiality, integrity, and availability is rated as complete compromise (C:C/I:C/A:C) because an attacker with physical access could gain full control, and security-critical tasks may not run as intended. There is no patch available for this vulnerability, and no known exploits have been reported in the wild. Given the age of the affected software (Internet Explorer 5.0), this vulnerability is largely of historical interest but could still pose risks in legacy environments.

Potential Impact

For European organizations, the primary impact of this vulnerability is on legacy systems still running Internet Explorer 5.0, which may exist in industrial control systems, embedded devices, or isolated legacy environments. Physical security risks are heightened because disabling the screen saver removes a layer of protection against unauthorized physical access. This could lead to data breaches, unauthorized system changes, or disruption of operations. The disabling of the Task Scheduler Service could cause failure of automated security tasks, increasing the risk of malware persistence or delayed patching. While modern systems are not affected, organizations with legacy infrastructure in sectors such as manufacturing, utilities, or government may face increased risk. The vulnerability could also complicate compliance with European data protection regulations if unauthorized access leads to data exposure.

Mitigation Recommendations

Given that no patch is available, organizations should focus on compensating controls. First, ensure strict physical security controls around any systems running Internet Explorer 5.0 to prevent unauthorized access. Use BIOS or firmware passwords and disable booting from external media to reduce risk. Where possible, upgrade or replace legacy systems to supported software versions. If upgrading is not feasible, implement network segmentation to isolate vulnerable systems and monitor them closely for suspicious activity. Re-enable or manually configure screen saver settings and Task Scheduler Service post-installation if possible. Additionally, enforce strict access control policies and consider using endpoint protection solutions that do not rely on the Task Scheduler. Regular audits of legacy systems should be conducted to verify security configurations and detect any unauthorized changes.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7def1d

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/28/2025, 4:10:45 AM

Last updated: 8/11/2025, 4:51:24 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats