Skip to main content

CVE-1999-1524: FlowPoint DSL router firmware versions prior to 3.0.8 allows a remote attacker to exploit a password

Medium
VulnerabilityCVE-1999-1524cve-1999-1524rce
Published: Sat Aug 07 1999 (08/07/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: flowpoint
Product: flowpoint_dsl_router

Description

FlowPoint DSL router firmware versions prior to 3.0.8 allows a remote attacker to exploit a password recovery feature from the network and conduct brute force password guessing, instead of limiting the feature to the serial console port.

AI-Powered Analysis

AILast updated: 07/01/2025, 16:25:53 UTC

Technical Analysis

CVE-1999-1524 is a medium-severity vulnerability affecting FlowPoint DSL routers with firmware versions prior to 3.0.8. The vulnerability arises from the design of the password recovery feature, which is intended to be accessible only via the router's serial console port. However, in the affected firmware versions, this feature is exposed over the network interface, allowing remote attackers to attempt brute force password guessing attacks. Because the password recovery mechanism does not impose restrictions on the number of attempts or limit access to local physical connections, an attacker can systematically try multiple passwords remotely without authentication. This flaw compromises the confidentiality of the router's administrative credentials, potentially allowing unauthorized access to the device's management interface. The vulnerability does not directly impact integrity or availability, and no remote code execution or denial of service is indicated. The CVSS score of 5.0 (medium) reflects the network attack vector, low attack complexity, no authentication required, and partial confidentiality impact. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the vulnerability (published in 1999) and the absence of updates, affected devices may still be in use in legacy or niche environments, posing a security risk if connected to untrusted networks.

Potential Impact

For European organizations, the primary impact of this vulnerability is unauthorized disclosure of router administrative credentials, which can lead to unauthorized configuration changes, interception of network traffic, or further lateral attacks within the network. Organizations relying on FlowPoint DSL routers with outdated firmware may face increased risk of compromise, especially if these devices are exposed to the internet or untrusted networks. The confidentiality breach could undermine network security policies and potentially expose sensitive internal communications. While the vulnerability does not directly cause service disruption or data integrity issues, unauthorized access to network infrastructure devices can facilitate more severe attacks. European enterprises in sectors with stringent data protection requirements (e.g., finance, healthcare, government) could face compliance and reputational risks if such vulnerabilities are exploited. The lack of available patches necessitates alternative mitigation strategies to reduce exposure.

Mitigation Recommendations

Given the absence of official patches, European organizations should prioritize the following mitigation steps: 1) Identify and inventory all FlowPoint DSL routers in use, verifying firmware versions to detect vulnerable devices. 2) Where possible, upgrade firmware to version 3.0.8 or later; if no official updates exist, consider replacing affected devices with modern, supported hardware. 3) Restrict network access to management interfaces by implementing network segmentation and firewall rules that limit access to trusted internal networks only. 4) Disable or physically restrict access to the password recovery feature if configurable, or isolate the device management interface from external networks. 5) Monitor network traffic for unusual access attempts or brute force activity targeting router management ports. 6) Employ strong network perimeter defenses, including intrusion detection/prevention systems, to detect and block unauthorized access attempts. 7) Educate network administrators on the risks of legacy devices and enforce strict access controls and credential management policies. These targeted actions go beyond generic advice by focusing on compensating controls and device lifecycle management in the absence of patches.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df153

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 4:25:53 PM

Last updated: 8/17/2025, 5:42:53 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats