CVE-1999-1572: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask wh
cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.
AI Analysis
Technical Summary
CVE-1999-1572 is a vulnerability affecting the cpio utility on several Unix-like operating systems, including FreeBSD 2.1.0, Debian GNU/Linux 3.0, and potentially other versions and distributions. The issue arises because cpio uses a zero umask (umask 0) when creating files with the -O (archive output) or -F (specify archive file) options. This results in files being created with permissions set to 0666 (readable and writable by all users). Consequently, any local user on the system can read or overwrite these files, which may lead to unauthorized disclosure of information or modification of archive contents. The vulnerability is local in nature, requiring the attacker to have access to the system to exploit it. The CVSS score is 2.1, reflecting a low severity primarily due to the limited scope and impact. No patches are currently available, and there are no known exploits in the wild. The vulnerability mainly affects older versions of operating systems, some of which are now obsolete, but similar issues could theoretically exist in other versions if the umask behavior is unchanged.
Potential Impact
For European organizations, the impact of this vulnerability is generally low given its local access requirement and the fact that it affects older operating system versions that are largely out of mainstream use. However, in environments where legacy systems running these specific versions of FreeBSD or Debian Linux are still operational, the vulnerability could allow local users to access or modify sensitive archive files created by cpio. This could lead to unauthorized disclosure of sensitive data or tampering with archived files, potentially undermining data integrity and confidentiality. In multi-user systems, such as shared servers or development environments, this could increase the risk of insider threats or accidental data exposure. The vulnerability does not affect availability and does not allow remote exploitation, limiting its broader impact on organizational operations.
Mitigation Recommendations
Given the absence of official patches, European organizations should consider the following practical mitigation steps: 1) Upgrade affected systems to supported and patched versions of the operating system where this vulnerability is resolved or the umask behavior is corrected. 2) Restrict local user access on systems running vulnerable versions to trusted personnel only, minimizing the risk of exploitation. 3) Avoid using cpio with the -O or -F options on vulnerable systems, or use alternative archiving tools that do not exhibit this behavior. 4) Implement file system permissions and access controls to limit the ability of local users to read or write to directories where cpio archives are created. 5) Monitor and audit usage of cpio and related file creation activities to detect any unusual or unauthorized operations. 6) For legacy systems that cannot be upgraded, consider isolating them from sensitive data and critical network segments to reduce risk exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-1999-1572: cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask wh
Description
cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.
AI-Powered Analysis
Technical Analysis
CVE-1999-1572 is a vulnerability affecting the cpio utility on several Unix-like operating systems, including FreeBSD 2.1.0, Debian GNU/Linux 3.0, and potentially other versions and distributions. The issue arises because cpio uses a zero umask (umask 0) when creating files with the -O (archive output) or -F (specify archive file) options. This results in files being created with permissions set to 0666 (readable and writable by all users). Consequently, any local user on the system can read or overwrite these files, which may lead to unauthorized disclosure of information or modification of archive contents. The vulnerability is local in nature, requiring the attacker to have access to the system to exploit it. The CVSS score is 2.1, reflecting a low severity primarily due to the limited scope and impact. No patches are currently available, and there are no known exploits in the wild. The vulnerability mainly affects older versions of operating systems, some of which are now obsolete, but similar issues could theoretically exist in other versions if the umask behavior is unchanged.
Potential Impact
For European organizations, the impact of this vulnerability is generally low given its local access requirement and the fact that it affects older operating system versions that are largely out of mainstream use. However, in environments where legacy systems running these specific versions of FreeBSD or Debian Linux are still operational, the vulnerability could allow local users to access or modify sensitive archive files created by cpio. This could lead to unauthorized disclosure of sensitive data or tampering with archived files, potentially undermining data integrity and confidentiality. In multi-user systems, such as shared servers or development environments, this could increase the risk of insider threats or accidental data exposure. The vulnerability does not affect availability and does not allow remote exploitation, limiting its broader impact on organizational operations.
Mitigation Recommendations
Given the absence of official patches, European organizations should consider the following practical mitigation steps: 1) Upgrade affected systems to supported and patched versions of the operating system where this vulnerability is resolved or the umask behavior is corrected. 2) Restrict local user access on systems running vulnerable versions to trusted personnel only, minimizing the risk of exploitation. 3) Avoid using cpio with the -O or -F options on vulnerable systems, or use alternative archiving tools that do not exhibit this behavior. 4) Implement file system permissions and access controls to limit the ability of local users to read or write to directories where cpio archives are created. 5) Monitor and audit usage of cpio and related file creation activities to detect any unusual or unauthorized operations. 6) For legacy systems that cannot be upgraded, consider isolating them from sensitive data and critical network segments to reduce risk exposure.
Affected Countries
Threat ID: 682ca32ab6fd31d6ed7de4f5
Added to database: 5/20/2025, 3:43:38 PM
Last enriched: 7/2/2025, 12:54:49 AM
Last updated: 2/7/2026, 10:27:12 AM
Views: 29
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25764: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opf openproject
LowCVE-2026-25729: CWE-863: Incorrect Authorization in lintsinghua DeepAudit
LowCVE-2025-15320: Multiple Binds to the Same Port in Tanium Tanium Client
LowCVE-2026-25724: CWE-61: UNIX Symbolic Link (Symlink) Following in anthropics claude-code
LowCVE-2026-1337: CWE-117 Improper Output Neutralization for Logs in neo4j Enterprise Edition
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.