Skip to main content

CVE-2000-0245: Vulnerability in SGI IRIX objectserver daemon allows remote attackers to create user accounts.

High
VulnerabilityCVE-2000-0245cve-2000-0245
Published: Mon Mar 27 2000 (03/27/2000, 05:00:00 UTC)
Source: NVD
Vendor/Project: sgi
Product: irix

Description

Vulnerability in SGI IRIX objectserver daemon allows remote attackers to create user accounts.

AI-Powered Analysis

AILast updated: 06/25/2025, 10:15:47 UTC

Technical Analysis

CVE-2000-0245 is a critical vulnerability affecting the SGI IRIX operating system, specifically versions 5.2 through 6.2. The flaw resides in the IRIX objectserver daemon, which is responsible for managing certain system-level services. This vulnerability allows remote attackers to create user accounts on the affected system without any authentication or user interaction. The exploitability is high due to the network attack vector (AV:N), low attack complexity (AC:L), and no requirement for authentication (Au:N). Successful exploitation compromises confidentiality, integrity, and availability (C:C/I:C/A:C) of the system, as unauthorized user accounts can be created, potentially leading to full system takeover. Despite the age of this vulnerability and the lack of known exploits in the wild, the absence of any available patches means that affected systems remain vulnerable if still in use. The vulnerability's critical CVSS score of 10 underscores the severity and ease with which an attacker can leverage this flaw to gain unauthorized access and control over the system.

Potential Impact

For European organizations still operating legacy SGI IRIX systems, this vulnerability poses a severe risk. Unauthorized account creation can lead to privilege escalation, data breaches, and disruption of critical services. Given that IRIX was historically used in high-performance computing, scientific research, and specialized industrial environments, exploitation could compromise sensitive intellectual property or disrupt essential infrastructure. The full compromise of affected systems could also serve as a foothold for lateral movement within networks, potentially impacting broader organizational security. Although the vulnerability dates back to 2000 and modern systems have largely replaced IRIX, organizations in sectors such as research institutions, manufacturing, or media that rely on legacy SGI hardware remain at risk. The lack of patches further exacerbates the threat, as mitigation relies heavily on compensating controls.

Mitigation Recommendations

Since no official patches are available for this vulnerability, European organizations should implement the following specific measures: 1) Isolate IRIX systems from untrusted networks by placing them behind strict firewalls and network segmentation to limit exposure of the objectserver daemon. 2) Employ strict access control lists (ACLs) to restrict which IP addresses can communicate with the objectserver daemon. 3) Monitor network traffic for unusual activity targeting the objectserver service, using intrusion detection systems (IDS) tailored to detect attempts to create unauthorized user accounts. 4) Where possible, disable or restrict the objectserver daemon if it is not essential for operations. 5) Consider migrating critical workloads from IRIX systems to modern, supported platforms to eliminate exposure. 6) Maintain rigorous audit logs and conduct regular reviews to detect any unauthorized account creation promptly. These targeted actions go beyond generic advice by focusing on network isolation, monitoring, and operational changes specific to the IRIX environment.

Need more detailed analysis?Get Pro

Threat ID: 682ca32db6fd31d6ed7df938

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 6/25/2025, 10:15:47 AM

Last updated: 7/28/2025, 1:14:09 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats