Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1420: NBase switches NH2012, NH2012R, NH2015, and NH2048 have a back door password that cannot be disabled

0
High
VulnerabilityCVE-1999-1420cve-1999-1420
Published: Mon Jul 20 1998 (07/20/1998, 04:00:00 UTC)
Source: NVD
Vendor/Project: n-base
Product: nh2012

Description

NBase switches NH2012, NH2012R, NH2015, and NH2048 have a back door password that cannot be disabled, which allows remote attackers to modify the switch's configuration.

AI-Powered Analysis

AILast updated: 06/29/2025, 18:25:33 UTC

Technical Analysis

CVE-1999-1420 identifies a critical vulnerability in NBase network switches models NH2012, NH2012R, NH2015, and NH2048. These switches contain a hardcoded backdoor password that cannot be disabled or removed by administrators. This backdoor allows remote attackers to gain unauthorized access to the switch's management interface without any authentication. Once accessed, attackers can fully modify the switch's configuration, potentially altering network traffic flows, disabling security controls, or creating persistent network access points. The vulnerability affects multiple firmware versions (1.33, 2.1, 2.51, 2.53) and has been assigned a maximum CVSS score of 10.0, reflecting its critical impact and ease of exploitation. The attack vector is network-based (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L). The vulnerability compromises confidentiality, integrity, and availability (C:C/I:C/A:C) of the affected devices. No patches or vendor fixes are available, and while no known exploits have been reported in the wild, the presence of an unremovable backdoor password represents a severe security risk. Given the age of the vulnerability (published in 1998), affected devices are likely legacy equipment still in use in some environments, which may pose ongoing risks if not replaced or isolated.

Potential Impact

For European organizations, the presence of this vulnerability in network infrastructure devices can lead to severe consequences. Compromised switches can allow attackers to intercept sensitive communications, manipulate network configurations to bypass security controls, or launch further attacks within the internal network. This can result in data breaches, disruption of critical services, and loss of trust. Industries with high reliance on stable and secure network infrastructure, such as finance, healthcare, telecommunications, and government, are particularly at risk. Additionally, the inability to patch or disable the backdoor means organizations must rely on compensating controls or device replacement, which can be costly and operationally challenging. The vulnerability also raises compliance concerns under regulations like GDPR, where unauthorized access and data breaches must be prevented and reported.

Mitigation Recommendations

Since no patches or vendor fixes exist for this vulnerability, European organizations should prioritize the following specific mitigation steps: 1) Identify and inventory all NBase NH2012, NH2012R, NH2015, and NH2048 switches in their networks, including firmware versions. 2) Immediately isolate these devices from critical network segments or the internet to reduce exposure. 3) Replace affected switches with modern, supported hardware that does not contain known backdoors. 4) Implement strict network segmentation and access controls to limit management interface exposure. 5) Monitor network traffic for unusual activity indicative of unauthorized access or configuration changes. 6) Employ network intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts. 7) Enforce strong physical security to prevent local access to devices. 8) Review and update incident response plans to address potential exploitation scenarios involving legacy network equipment.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7dea55

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/29/2025, 6:25:33 PM

Last updated: 2/7/2026, 6:36:17 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats