Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2000-0245: Vulnerability in SGI IRIX objectserver daemon allows remote attackers to create user accounts.

0
High
VulnerabilityCVE-2000-0245cve-2000-0245
Published: Mon Mar 27 2000 (03/27/2000, 05:00:00 UTC)
Source: NVD
Vendor/Project: sgi
Product: irix

Description

Vulnerability in SGI IRIX objectserver daemon allows remote attackers to create user accounts.

AI-Powered Analysis

AILast updated: 06/25/2025, 10:15:47 UTC

Technical Analysis

CVE-2000-0245 is a critical vulnerability affecting the SGI IRIX operating system, specifically versions 5.2 through 6.2. The flaw resides in the IRIX objectserver daemon, which is responsible for managing certain system-level services. This vulnerability allows remote attackers to create user accounts on the affected system without any authentication or user interaction. The exploitability is high due to the network attack vector (AV:N), low attack complexity (AC:L), and no requirement for authentication (Au:N). Successful exploitation compromises confidentiality, integrity, and availability (C:C/I:C/A:C) of the system, as unauthorized user accounts can be created, potentially leading to full system takeover. Despite the age of this vulnerability and the lack of known exploits in the wild, the absence of any available patches means that affected systems remain vulnerable if still in use. The vulnerability's critical CVSS score of 10 underscores the severity and ease with which an attacker can leverage this flaw to gain unauthorized access and control over the system.

Potential Impact

For European organizations still operating legacy SGI IRIX systems, this vulnerability poses a severe risk. Unauthorized account creation can lead to privilege escalation, data breaches, and disruption of critical services. Given that IRIX was historically used in high-performance computing, scientific research, and specialized industrial environments, exploitation could compromise sensitive intellectual property or disrupt essential infrastructure. The full compromise of affected systems could also serve as a foothold for lateral movement within networks, potentially impacting broader organizational security. Although the vulnerability dates back to 2000 and modern systems have largely replaced IRIX, organizations in sectors such as research institutions, manufacturing, or media that rely on legacy SGI hardware remain at risk. The lack of patches further exacerbates the threat, as mitigation relies heavily on compensating controls.

Mitigation Recommendations

Since no official patches are available for this vulnerability, European organizations should implement the following specific measures: 1) Isolate IRIX systems from untrusted networks by placing them behind strict firewalls and network segmentation to limit exposure of the objectserver daemon. 2) Employ strict access control lists (ACLs) to restrict which IP addresses can communicate with the objectserver daemon. 3) Monitor network traffic for unusual activity targeting the objectserver service, using intrusion detection systems (IDS) tailored to detect attempts to create unauthorized user accounts. 4) Where possible, disable or restrict the objectserver daemon if it is not essential for operations. 5) Consider migrating critical workloads from IRIX systems to modern, supported platforms to eliminate exposure. 6) Maintain rigorous audit logs and conduct regular reviews to detect any unauthorized account creation promptly. These targeted actions go beyond generic advice by focusing on network isolation, monitoring, and operational changes specific to the IRIX environment.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32db6fd31d6ed7df938

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 6/25/2025, 10:15:47 AM

Last updated: 2/7/2026, 10:22:59 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats