Skip to main content

CVE-1999-1421: NBase switches NH208 and NH215 run a TFTP server which allows remote attackers to send software upda

Medium
VulnerabilityCVE-1999-1421cve-1999-1421denial of service
Published: Mon Jul 20 1998 (07/20/1998, 04:00:00 UTC)
Source: NVD
Vendor/Project: n-base
Product: nh208

Description

NBase switches NH208 and NH215 run a TFTP server which allows remote attackers to send software updates to modify the switch or cause a denial of service (crash) by guessing the target filenames, which have default names.

AI-Powered Analysis

AILast updated: 07/01/2025, 21:56:16 UTC

Technical Analysis

CVE-1999-1421 is a vulnerability affecting NBase NH208 and NH215 network switches. These devices run a Trivial File Transfer Protocol (TFTP) server that is accessible remotely without authentication. The TFTP server accepts incoming software update files, which can be exploited by an attacker who guesses the default target filenames used by the switch. By sending crafted software update files to these default filenames, an attacker can either modify the switch's software or cause a denial of service (DoS) by crashing the device. The vulnerability arises from the lack of authentication and the use of predictable filenames, allowing unauthorized remote modification or disruption of the switch's operation. The CVSS score of 6.4 (medium severity) reflects that the attack vector is network-based (no physical access required), with low attack complexity, no authentication needed, and impacts integrity and availability but not confidentiality. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the vulnerability (published in 1998), it primarily affects legacy NBase NH208 and NH215 switches that may still be in operation in some environments.

Potential Impact

For European organizations, the impact of this vulnerability can be significant if legacy NBase NH208 or NH215 switches are still deployed within their network infrastructure. Successful exploitation could allow attackers to alter switch firmware or configurations, potentially leading to network outages, degraded performance, or unauthorized network behavior. This could disrupt critical business operations, especially in sectors relying on stable network connectivity such as finance, manufacturing, healthcare, and government. The denial of service aspect could cause network downtime, impacting availability of services and communications. Although confidentiality is not directly impacted, the integrity and availability of network infrastructure are at risk. Given the lack of patches, organizations may face challenges in remediation, increasing the risk if these devices remain in use.

Mitigation Recommendations

Since no patches are available, mitigation must focus on compensating controls. Organizations should first identify and inventory any NBase NH208 and NH215 switches in their networks. If found, immediate plans should be made to replace these legacy devices with modern, supported switches that have secure update mechanisms. Until replacement, network segmentation should be applied to isolate these switches from untrusted networks, restricting TFTP traffic to trusted management hosts only. Access control lists (ACLs) and firewall rules should block unauthorized inbound TFTP requests. Monitoring network traffic for unusual TFTP activity can help detect exploitation attempts. Additionally, disabling the TFTP server on these switches, if possible, or changing default filenames (if configurable) can reduce risk. Regular network device audits and vulnerability assessments should be conducted to ensure no legacy vulnerable devices remain in critical network paths.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7dea62

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 9:56:16 PM

Last updated: 7/26/2025, 11:09:44 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats