Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1395: Vulnerability in Monitor utility (SYS$SHARE:SPISHR.EXE) in VMS 5.0 through 5.4-2 allows local users

0
High
VulnerabilityCVE-1999-1395cve-1999-1395
Published: Tue Nov 17 1992 (11/17/1992, 05:00:00 UTC)
Source: NVD
Vendor/Project: dec
Product: dec_openvms

Description

Vulnerability in Monitor utility (SYS$SHARE:SPISHR.EXE) in VMS 5.0 through 5.4-2 allows local users to gain privileges.

AI-Powered Analysis

AILast updated: 07/01/2025, 17:42:49 UTC

Technical Analysis

CVE-1999-1395 is a high-severity local privilege escalation vulnerability affecting the Monitor utility (SYS$SHARE:SPISHR.EXE) in DEC OpenVMS operating systems versions 5.0 through 5.4-2. The vulnerability allows local users to gain elevated privileges, potentially granting them unauthorized administrative or system-level access. The Monitor utility is a system component used for monitoring and managing system processes and resources. Exploitation requires local access to the system, but no authentication is needed, and the attack complexity is low. The vulnerability impacts confidentiality, integrity, and availability, as an attacker with elevated privileges could access sensitive data, modify system configurations, or disrupt system operations. Despite its age and the lack of known exploits in the wild, this vulnerability remains critical for legacy systems still running these OpenVMS versions. No patches are available, which increases the risk for systems that cannot be upgraded or mitigated through other means.

Potential Impact

For European organizations still operating legacy DEC OpenVMS systems in the affected versions, this vulnerability poses a significant risk. Privilege escalation could lead to unauthorized access to sensitive business data, disruption of critical infrastructure, and potential compliance violations under regulations such as GDPR. The ability for a local user to gain elevated privileges could facilitate insider threats or lateral movement by attackers who have gained initial access. This is particularly impactful for sectors relying on legacy systems for industrial control, telecommunications, or government services, where system integrity and availability are paramount. The lack of patch availability means organizations must rely on compensating controls to mitigate risk, increasing operational complexity and potential exposure.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement strict access controls to limit local user access to affected OpenVMS systems. Employing robust user account management, including the principle of least privilege, is critical. Monitoring and logging of local user activities on these systems should be enhanced to detect suspicious behavior indicative of privilege escalation attempts. Network segmentation can isolate vulnerable systems from broader enterprise networks to reduce attack surface. Where possible, migrating to newer, supported operating system versions or alternative platforms should be prioritized. Additionally, implementing host-based intrusion detection systems (HIDS) and regular security audits can help identify and respond to exploitation attempts. Organizations should also consider virtual patching techniques or application whitelisting to restrict execution of unauthorized binaries.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de3d8

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 5:42:49 PM

Last updated: 2/7/2026, 7:57:05 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats