Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1421: NBase switches NH208 and NH215 run a TFTP server which allows remote attackers to send software upda

0
Medium
VulnerabilityCVE-1999-1421cve-1999-1421denial of service
Published: Mon Jul 20 1998 (07/20/1998, 04:00:00 UTC)
Source: NVD
Vendor/Project: n-base
Product: nh208

Description

NBase switches NH208 and NH215 run a TFTP server which allows remote attackers to send software updates to modify the switch or cause a denial of service (crash) by guessing the target filenames, which have default names.

AI-Powered Analysis

AILast updated: 07/01/2025, 21:56:16 UTC

Technical Analysis

CVE-1999-1421 is a vulnerability affecting NBase NH208 and NH215 network switches. These devices run a Trivial File Transfer Protocol (TFTP) server that is accessible remotely without authentication. The TFTP server accepts incoming software update files, which can be exploited by an attacker who guesses the default target filenames used by the switch. By sending crafted software update files to these default filenames, an attacker can either modify the switch's software or cause a denial of service (DoS) by crashing the device. The vulnerability arises from the lack of authentication and the use of predictable filenames, allowing unauthorized remote modification or disruption of the switch's operation. The CVSS score of 6.4 (medium severity) reflects that the attack vector is network-based (no physical access required), with low attack complexity, no authentication needed, and impacts integrity and availability but not confidentiality. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the vulnerability (published in 1998), it primarily affects legacy NBase NH208 and NH215 switches that may still be in operation in some environments.

Potential Impact

For European organizations, the impact of this vulnerability can be significant if legacy NBase NH208 or NH215 switches are still deployed within their network infrastructure. Successful exploitation could allow attackers to alter switch firmware or configurations, potentially leading to network outages, degraded performance, or unauthorized network behavior. This could disrupt critical business operations, especially in sectors relying on stable network connectivity such as finance, manufacturing, healthcare, and government. The denial of service aspect could cause network downtime, impacting availability of services and communications. Although confidentiality is not directly impacted, the integrity and availability of network infrastructure are at risk. Given the lack of patches, organizations may face challenges in remediation, increasing the risk if these devices remain in use.

Mitigation Recommendations

Since no patches are available, mitigation must focus on compensating controls. Organizations should first identify and inventory any NBase NH208 and NH215 switches in their networks. If found, immediate plans should be made to replace these legacy devices with modern, supported switches that have secure update mechanisms. Until replacement, network segmentation should be applied to isolate these switches from untrusted networks, restricting TFTP traffic to trusted management hosts only. Access control lists (ACLs) and firewall rules should block unauthorized inbound TFTP requests. Monitoring network traffic for unusual TFTP activity can help detect exploitation attempts. Additionally, disabling the TFTP server on these switches, if possible, or changing default filenames (if configurable) can reduce risk. Regular network device audits and vulnerability assessments should be conducted to ensure no legacy vulnerable devices remain in critical network paths.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7dea62

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 9:56:16 PM

Last updated: 2/7/2026, 1:29:39 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats