Skip to main content

CVE-1999-1559: Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (contr

Medium
VulnerabilityCVE-1999-1559cve-1999-1559
Published: Wed Mar 31 1999 (03/31/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: alcatel
Product: omniswitch

Description

Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (control d) character, which locks other users out of the switch because it only supports one session at a time.

AI-Powered Analysis

AILast updated: 07/01/2025, 18:57:11 UTC

Technical Analysis

CVE-1999-1559 is a vulnerability affecting Xylan OmniSwitch devices prior to version 3.2.6, a network switch product by Alcatel. The vulnerability allows remote attackers to bypass the login prompt by sending a CTRL-D (control-D) character to the device. This character causes the switch to bypass authentication and grants access without requiring valid credentials. Additionally, because the OmniSwitch supports only a single session at a time, this exploit can lock out legitimate users from accessing the device, effectively causing a denial of service (DoS). The vulnerability does not impact confidentiality or integrity directly, as it does not provide unauthorized access to sensitive data or allow modification of configurations, but it does impact availability by preventing legitimate administrative access. The CVSS score is 5.0 (medium severity), reflecting the network vector (remote exploit), low attack complexity, no authentication required, no confidentiality or integrity impact, but partial availability impact. No patches are available for this vulnerability, and there are no known exploits in the wild. Given the age of the vulnerability (published in 1999) and the product version affected, this issue primarily concerns legacy systems still in operation.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential denial of service on network management interfaces of affected OmniSwitch devices. Organizations relying on these switches for critical network infrastructure could experience administrative lockout, preventing timely configuration changes or incident response. This could lead to prolonged network outages or degraded network performance if the switch cannot be managed or rebooted remotely. While the vulnerability does not allow data exfiltration or direct compromise of network traffic, the loss of administrative control can indirectly affect network security posture and operational continuity. European enterprises in sectors with legacy network equipment, such as industrial, telecommunications, or government agencies, may be particularly vulnerable if they have not upgraded or replaced affected OmniSwitch models. The lack of a patch means organizations must rely on compensating controls or device replacement to mitigate risk.

Mitigation Recommendations

Since no patch is available for this vulnerability, European organizations should consider the following specific mitigation steps: 1) Identify and inventory all Xylan OmniSwitch devices in their network environment, focusing on versions prior to 3.2.6. 2) Limit network access to the management interfaces of these switches by implementing strict access control lists (ACLs) or firewall rules that restrict access to trusted administrative hosts only. 3) Use network segmentation to isolate legacy switches from general user networks to reduce exposure to remote attackers. 4) Monitor network traffic for unusual patterns, such as unexpected CTRL-D characters or repeated login attempts that could indicate exploitation attempts. 5) Where possible, replace or upgrade affected OmniSwitch devices to versions that are not vulnerable or migrate to modern switch hardware with supported security features. 6) Implement out-of-band management channels for critical network devices to ensure administrative access remains available even if the primary management interface is compromised or locked out. 7) Train network administrators to recognize and respond to signs of this vulnerability exploitation, including lockouts and unexpected session terminations.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7def25

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 6:57:11 PM

Last updated: 7/25/2025, 7:21:15 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats