CVE-1999-1409: The at program in IRIX 6.2 and NetBSD 1.3.2 and earlier allows local users to read portions of arbit
The at program in IRIX 6.2 and NetBSD 1.3.2 and earlier allows local users to read portions of arbitrary files by submitting the file to at with the -f argument, which generates error messages that at sends to the user via e-mail.
AI Analysis
Technical Summary
CVE-1999-1409 is a low-severity local information disclosure vulnerability affecting the 'at' program in IRIX versions 6.2 through 6.5.1 and NetBSD versions 1.0 through 1.3.1 and earlier. The 'at' utility is used to schedule commands to be executed at a later time. This vulnerability arises when a local user submits a file to the 'at' command using the '-f' argument. If the file contains references to arbitrary files that cannot be processed correctly, the 'at' program generates error messages that include portions of these arbitrary files. These error messages are then sent to the user via email, effectively allowing the user to read parts of files they would not normally have permission to access. The vulnerability does not allow modification or deletion of files, nor does it allow remote exploitation, as it requires local user access. The CVSS score of 2.1 reflects the limited impact and low complexity of exploitation, with no authentication required but limited to local access. No patches are available for this vulnerability, and there are no known exploits in the wild. The vulnerability primarily impacts confidentiality by exposing partial contents of arbitrary files to unauthorized local users, but it does not affect integrity or availability.
Potential Impact
For European organizations, the impact of CVE-1999-1409 is generally low due to the requirement for local access and the limited scope of information disclosure. However, in environments where IRIX or NetBSD systems are still in use—such as legacy industrial control systems, research institutions, or specialized computing environments—this vulnerability could allow unauthorized local users to gain partial access to sensitive configuration files, credentials, or other confidential data. This could facilitate further privilege escalation or lateral movement within the network if combined with other vulnerabilities or misconfigurations. Given the age of the affected systems and the lack of patches, organizations relying on these platforms should be aware of the risk of insider threats or unauthorized local access leading to information leakage. The vulnerability does not pose a direct threat to system availability or integrity, but the confidentiality breach could have compliance and operational implications depending on the sensitivity of the exposed data.
Mitigation Recommendations
Since no official patches are available for this vulnerability, European organizations should focus on compensating controls to mitigate risk. These include: 1) Restricting local user access strictly to trusted personnel and enforcing the principle of least privilege to minimize the number of users who can execute the 'at' command. 2) Monitoring and auditing usage of the 'at' utility and local user activities to detect suspicious attempts to exploit this vulnerability. 3) If feasible, disabling the 'at' service entirely on systems where it is not required to eliminate the attack vector. 4) Segregating legacy IRIX and NetBSD systems from critical network segments to limit potential lateral movement. 5) Employing host-based intrusion detection systems (HIDS) to alert on anomalous file access or email generation related to the 'at' command. 6) Planning for migration or upgrade from unsupported IRIX and NetBSD versions to modern, supported operating systems to remove exposure to this and other legacy vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland
CVE-1999-1409: The at program in IRIX 6.2 and NetBSD 1.3.2 and earlier allows local users to read portions of arbit
Description
The at program in IRIX 6.2 and NetBSD 1.3.2 and earlier allows local users to read portions of arbitrary files by submitting the file to at with the -f argument, which generates error messages that at sends to the user via e-mail.
AI-Powered Analysis
Technical Analysis
CVE-1999-1409 is a low-severity local information disclosure vulnerability affecting the 'at' program in IRIX versions 6.2 through 6.5.1 and NetBSD versions 1.0 through 1.3.1 and earlier. The 'at' utility is used to schedule commands to be executed at a later time. This vulnerability arises when a local user submits a file to the 'at' command using the '-f' argument. If the file contains references to arbitrary files that cannot be processed correctly, the 'at' program generates error messages that include portions of these arbitrary files. These error messages are then sent to the user via email, effectively allowing the user to read parts of files they would not normally have permission to access. The vulnerability does not allow modification or deletion of files, nor does it allow remote exploitation, as it requires local user access. The CVSS score of 2.1 reflects the limited impact and low complexity of exploitation, with no authentication required but limited to local access. No patches are available for this vulnerability, and there are no known exploits in the wild. The vulnerability primarily impacts confidentiality by exposing partial contents of arbitrary files to unauthorized local users, but it does not affect integrity or availability.
Potential Impact
For European organizations, the impact of CVE-1999-1409 is generally low due to the requirement for local access and the limited scope of information disclosure. However, in environments where IRIX or NetBSD systems are still in use—such as legacy industrial control systems, research institutions, or specialized computing environments—this vulnerability could allow unauthorized local users to gain partial access to sensitive configuration files, credentials, or other confidential data. This could facilitate further privilege escalation or lateral movement within the network if combined with other vulnerabilities or misconfigurations. Given the age of the affected systems and the lack of patches, organizations relying on these platforms should be aware of the risk of insider threats or unauthorized local access leading to information leakage. The vulnerability does not pose a direct threat to system availability or integrity, but the confidentiality breach could have compliance and operational implications depending on the sensitivity of the exposed data.
Mitigation Recommendations
Since no official patches are available for this vulnerability, European organizations should focus on compensating controls to mitigate risk. These include: 1) Restricting local user access strictly to trusted personnel and enforcing the principle of least privilege to minimize the number of users who can execute the 'at' command. 2) Monitoring and auditing usage of the 'at' utility and local user activities to detect suspicious attempts to exploit this vulnerability. 3) If feasible, disabling the 'at' service entirely on systems where it is not required to eliminate the attack vector. 4) Segregating legacy IRIX and NetBSD systems from critical network segments to limit potential lateral movement. 5) Employing host-based intrusion detection systems (HIDS) to alert on anomalous file access or email generation related to the 'at' command. 6) Planning for migration or upgrade from unsupported IRIX and NetBSD versions to modern, supported operating systems to remove exposure to this and other legacy vulnerabilities.
Affected Countries
Threat ID: 682ca32bb6fd31d6ed7dea24
Added to database: 5/20/2025, 3:43:39 PM
Last enriched: 7/1/2025, 9:57:39 PM
Last updated: 2/7/2026, 7:09:56 PM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25764: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opf openproject
LowCVE-2026-25729: CWE-863: Incorrect Authorization in lintsinghua DeepAudit
LowCVE-2025-15320: Multiple Binds to the Same Port in Tanium Tanium Client
LowCVE-2026-25724: CWE-61: UNIX Symbolic Link (Symlink) Following in anthropics claude-code
LowCVE-2026-1337: CWE-117 Improper Output Neutralization for Logs in neo4j Enterprise Edition
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.