Skip to main content

CVE-2000-0255: The Nbase-Xyplex EdgeBlaster router allows remote attackers to cause a denial of service via a scan

Medium
VulnerabilityCVE-2000-0255cve-2000-0255denial of service
Published: Wed Apr 05 2000 (04/05/2000, 04:00:00 UTC)
Source: NVD
Vendor/Project: nbase-xyplex
Product: edgeblaster

Description

The Nbase-Xyplex EdgeBlaster router allows remote attackers to cause a denial of service via a scan for the FormMail CGI program.

AI-Powered Analysis

AILast updated: 06/30/2025, 15:11:20 UTC

Technical Analysis

CVE-2000-0255 is a medium severity vulnerability affecting the Nbase-Xyplex EdgeBlaster router, specifically version 1.0. This vulnerability allows remote attackers to cause a denial of service (DoS) condition by performing a scan targeting the FormMail CGI program. The EdgeBlaster router improperly handles requests related to this CGI, which can be exploited remotely without authentication or user interaction. The vulnerability does not impact confidentiality or integrity but affects availability by potentially crashing or rendering the router unresponsive. The Common Vulnerability Scoring System (CVSS) score is 5.0, reflecting a network attack vector with low complexity and no required privileges, but only causing partial impact (availability only). No patches or fixes are available, and there are no known exploits in the wild, indicating limited active exploitation. The vulnerability dates back to 2000, suggesting that affected devices are likely legacy or obsolete hardware. The lack of patch availability means mitigation relies on network-level controls or device replacement.

Potential Impact

For European organizations, the primary impact is disruption of network connectivity and services relying on the EdgeBlaster router. A successful DoS attack could interrupt business operations, degrade service availability, and potentially cause cascading failures if the router is a critical network component. Given the age of the vulnerability and product, organizations still using this hardware may face operational risks due to unsupported devices. The absence of confidentiality or integrity impact reduces risks of data breaches, but availability interruptions can affect sectors requiring high uptime such as finance, healthcare, and critical infrastructure. Additionally, the lack of known exploits reduces immediate threat but does not eliminate risk from opportunistic attackers scanning for vulnerable legacy devices.

Mitigation Recommendations

Since no patch is available, European organizations should prioritize identifying any EdgeBlaster routers in their networks and plan for immediate replacement with modern, supported hardware. Network segmentation can limit exposure by isolating legacy devices from the internet and untrusted networks. Implementing strict firewall rules to block unsolicited inbound traffic targeting the FormMail CGI or related ports can reduce attack surface. Monitoring network traffic for unusual scanning activity and deploying intrusion detection/prevention systems (IDS/IPS) with signatures for this vulnerability can help detect and mitigate attempts. Regular network asset inventories and vulnerability assessments should be conducted to identify unsupported devices. Finally, organizations should consider upgrading to routers with active vendor support and security updates to prevent similar risks.

Need more detailed analysis?Get Pro

Threat ID: 682ca32db6fd31d6ed7df96e

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 6/30/2025, 3:11:20 PM

Last updated: 7/26/2025, 1:42:02 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats