Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2000-0022: Lotus Domino HTTP server does not properly disable anonymous access for the cgi-bin directory.

0
Medium
VulnerabilityCVE-2000-0022cve-2000-0022
Published: Tue Dec 21 1999 (12/21/1999, 05:00:00 UTC)
Source: NVD
Vendor/Project: lotus
Product: domino_server

Description

Lotus Domino HTTP server does not properly disable anonymous access for the cgi-bin directory.

AI-Powered Analysis

AILast updated: 07/01/2025, 12:41:49 UTC

Technical Analysis

CVE-2000-0022 is a medium-severity vulnerability affecting Lotus Domino HTTP Server versions 4.6 and 4.6.x. The issue arises because the server does not properly disable anonymous access to the cgi-bin directory. The cgi-bin directory typically contains executable CGI scripts that can be invoked via HTTP requests. If anonymous access is allowed, unauthenticated attackers can potentially execute these scripts without restriction. Although the vulnerability does not directly allow modification or deletion of data (no integrity or availability impact), it does expose confidential information (confidentiality impact) by allowing unauthorized script execution that may reveal sensitive data. The vulnerability has a CVSS v2 base score of 5.0, with the vector AV:N/AC:L/Au:N/C:P/I:N/A:N, indicating network attack vector, low attack complexity, no authentication required, partial confidentiality impact, and no impact on integrity or availability. No patch is available for this vulnerability, and there are no known exploits in the wild. Given the age of the affected versions (circa 1999-2000), this vulnerability primarily concerns legacy systems that have not been updated or replaced. The lack of authentication requirement and network accessibility make this vulnerability exploitable remotely by any attacker. However, the impact is limited to information disclosure rather than system compromise or denial of service.

Potential Impact

For European organizations, the impact of CVE-2000-0022 depends largely on whether legacy Lotus Domino servers running version 4.6 or 4.6.x are still in operation. Organizations that continue to use these outdated servers may face unauthorized disclosure of sensitive information through the cgi-bin directory. This could lead to exposure of internal data or configuration details, potentially aiding further attacks. While the vulnerability does not allow direct system compromise, information leakage can undermine confidentiality and trust, especially in regulated sectors such as finance, healthcare, and government. European organizations subject to GDPR must consider the risk of personal data exposure, which could result in regulatory penalties and reputational damage. Given the age of the vulnerability and absence of known exploits, the immediate risk is low for most organizations that have modernized their infrastructure. However, any legacy systems still exposed to the internet or internal networks without proper access controls remain at risk.

Mitigation Recommendations

Since no official patch is available for this vulnerability, European organizations should implement compensating controls to mitigate the risk. First, restrict network access to the Lotus Domino HTTP server, especially the cgi-bin directory, by using firewalls or network segmentation to limit exposure to trusted users only. Second, disable or remove unnecessary CGI scripts from the cgi-bin directory to reduce the attack surface. Third, implement strict access controls and authentication mechanisms at the web server or application level to prevent anonymous access. Fourth, monitor server logs for unusual or unauthorized access attempts to the cgi-bin directory. Finally, organizations should plan to upgrade or replace legacy Lotus Domino servers with supported versions or alternative platforms that do not have this vulnerability. Regular vulnerability assessments and penetration testing can help identify residual risks related to this issue.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7df52d

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 12:41:49 PM

Last updated: 2/7/2026, 4:16:52 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats