CVE-1999-1474: PowerPoint 95 and 97 allows remote attackers to cause an application to be run automatically without
PowerPoint 95 and 97 allows remote attackers to cause an application to be run automatically without prompting the user, possibly through the slide show, when the document is opened in browsers such as Internet Explorer.
AI Analysis
Technical Summary
CVE-1999-1474 is a high-severity vulnerability affecting Microsoft PowerPoint versions 95 and 97. This vulnerability allows remote attackers to execute arbitrary applications automatically without user consent when a malicious PowerPoint document is opened, particularly when viewed through web browsers such as Internet Explorer. The issue arises from the way PowerPoint handles embedded objects or slide show content, enabling the automatic execution of external applications without prompting the user. This behavior can be exploited by attackers to run malicious code on the victim's system, potentially leading to full compromise. The vulnerability has a CVSS score of 7.5, reflecting its network attack vector (AV:N), low attack complexity (AC:L), no authentication required (Au:N), and impacts on confidentiality, integrity, and availability (C:P/I:P/A:P). No patches or official fixes are available, and there are no known exploits in the wild documented at this time. Given the age of the affected software, it is likely that these versions are no longer widely used in modern environments; however, legacy systems or archival environments may still be vulnerable. The vulnerability is particularly critical because it allows remote code execution without user interaction beyond opening the document, increasing the risk of automated or drive-by attacks via compromised websites or malicious email attachments.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the presence of legacy systems running PowerPoint 95 or 97, which is uncommon in contemporary environments but may exist in archival, industrial, or specialized contexts. If exploited, attackers could execute arbitrary code remotely, leading to data breaches, system compromise, or disruption of business operations. Confidentiality could be severely impacted by unauthorized data access or exfiltration. Integrity could be compromised by unauthorized modification of data or system configurations. Availability could be affected if attackers deploy destructive payloads or ransomware. The automatic execution without user prompts increases the risk of successful exploitation through social engineering or drive-by downloads, especially in environments where Internet Explorer is still in use. European organizations with legacy document management systems or those relying on older Office suites are at higher risk. Additionally, sectors with stringent data protection requirements (e.g., finance, healthcare, government) could face regulatory and reputational damage if exploited.
Mitigation Recommendations
Given the absence of official patches, European organizations should prioritize the following mitigations: 1) Identify and inventory any systems still running PowerPoint 95 or 97 and isolate them from internet-facing networks. 2) Migrate legacy documents to modern, supported Office formats and software versions to eliminate reliance on vulnerable software. 3) Disable or restrict the use of Internet Explorer for opening PowerPoint files, as the vulnerability is notably exploitable via IE. 4) Implement strict email filtering and attachment scanning to block or quarantine suspicious PowerPoint files, especially those originating from untrusted sources. 5) Employ application whitelisting to prevent unauthorized execution of applications triggered by PowerPoint files. 6) Educate users about the risks of opening legacy PowerPoint documents from unknown or untrusted sources. 7) Use endpoint detection and response (EDR) solutions to monitor for anomalous process executions that may indicate exploitation attempts. 8) Where legacy systems must be maintained, consider running them in isolated virtual environments with no network connectivity to limit exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands
CVE-1999-1474: PowerPoint 95 and 97 allows remote attackers to cause an application to be run automatically without
Description
PowerPoint 95 and 97 allows remote attackers to cause an application to be run automatically without prompting the user, possibly through the slide show, when the document is opened in browsers such as Internet Explorer.
AI-Powered Analysis
Technical Analysis
CVE-1999-1474 is a high-severity vulnerability affecting Microsoft PowerPoint versions 95 and 97. This vulnerability allows remote attackers to execute arbitrary applications automatically without user consent when a malicious PowerPoint document is opened, particularly when viewed through web browsers such as Internet Explorer. The issue arises from the way PowerPoint handles embedded objects or slide show content, enabling the automatic execution of external applications without prompting the user. This behavior can be exploited by attackers to run malicious code on the victim's system, potentially leading to full compromise. The vulnerability has a CVSS score of 7.5, reflecting its network attack vector (AV:N), low attack complexity (AC:L), no authentication required (Au:N), and impacts on confidentiality, integrity, and availability (C:P/I:P/A:P). No patches or official fixes are available, and there are no known exploits in the wild documented at this time. Given the age of the affected software, it is likely that these versions are no longer widely used in modern environments; however, legacy systems or archival environments may still be vulnerable. The vulnerability is particularly critical because it allows remote code execution without user interaction beyond opening the document, increasing the risk of automated or drive-by attacks via compromised websites or malicious email attachments.
Potential Impact
For European organizations, the impact of this vulnerability depends largely on the presence of legacy systems running PowerPoint 95 or 97, which is uncommon in contemporary environments but may exist in archival, industrial, or specialized contexts. If exploited, attackers could execute arbitrary code remotely, leading to data breaches, system compromise, or disruption of business operations. Confidentiality could be severely impacted by unauthorized data access or exfiltration. Integrity could be compromised by unauthorized modification of data or system configurations. Availability could be affected if attackers deploy destructive payloads or ransomware. The automatic execution without user prompts increases the risk of successful exploitation through social engineering or drive-by downloads, especially in environments where Internet Explorer is still in use. European organizations with legacy document management systems or those relying on older Office suites are at higher risk. Additionally, sectors with stringent data protection requirements (e.g., finance, healthcare, government) could face regulatory and reputational damage if exploited.
Mitigation Recommendations
Given the absence of official patches, European organizations should prioritize the following mitigations: 1) Identify and inventory any systems still running PowerPoint 95 or 97 and isolate them from internet-facing networks. 2) Migrate legacy documents to modern, supported Office formats and software versions to eliminate reliance on vulnerable software. 3) Disable or restrict the use of Internet Explorer for opening PowerPoint files, as the vulnerability is notably exploitable via IE. 4) Implement strict email filtering and attachment scanning to block or quarantine suspicious PowerPoint files, especially those originating from untrusted sources. 5) Employ application whitelisting to prevent unauthorized execution of applications triggered by PowerPoint files. 6) Educate users about the risks of opening legacy PowerPoint documents from unknown or untrusted sources. 7) Use endpoint detection and response (EDR) solutions to monitor for anomalous process executions that may indicate exploitation attempts. 8) Where legacy systems must be maintained, consider running them in isolated virtual environments with no network connectivity to limit exposure.
Affected Countries
Threat ID: 682ca32db6fd31d6ed7df69d
Added to database: 5/20/2025, 3:43:41 PM
Last enriched: 6/25/2025, 4:00:57 PM
Last updated: 2/4/2026, 11:51:37 AM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
When Cloud Outages Ripple Across the Internet
HighCVE-2025-15285: CWE-862 Missing Authorization in lupsonline SEO Flow by LupsOnline
HighCVE-2025-15268: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in infility Infility Global
HighCVE-2026-24773: CWE-639: Authorization Bypass Through User-Controlled Key in gunet openeclass
HighCVE-2026-24672: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in gunet openeclass
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.