Microsoft Windows 95/98/ME/NT File System FAT privileges management
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 9.2 | $0-$5k | 1.90 |
Summary
A vulnerability described as critical has been identified in Microsoft Windows 95/98/ME/NT. The impacted element is an unknown function of the component File System. Executing a manipulation as part of FAT can lead to privileges management. This vulnerability is tracked as CVE-1999-0584. Moreover, an exploit is present. Modifying the configuration settings is advised.
Details
A vulnerability was found in Microsoft Windows 95/98/ME/NT (Operating System). It has been declared as very critical. This vulnerability affects an unknown code block of the component File System. The manipulation as part of a FAT leads to a privileges management vulnerability. The CWE definition for the vulnerability is CWE-269. The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
A Windows NT file system is not NTFS.
The issue has been introduced in 08/24/1995. The weakness was disclosed 01/01/1999. This vulnerability was named CVE-1999-0584. The exploitation appears to be easy. The attack can be initiated remotely. No form of authentication is required for a successful exploitation. Technical details are unknown but a public exploit is available. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment (estimation calculated on 04/18/2026). This vulnerability is assigned to T1068 by the MITRE ATT&CK project.
It is declared as highly functional. The vulnerability was handled as a non-public zero-day exploit for at least 1226 days. During that time the estimated underground price was around $25k-$100k.
It is possible to mitigate the problem by applying the configuration setting .
The vulnerability is also documented in the databases at X-Force (195) and Vulnerability Center (SBV-668†). The entries VDB-14366, VDB-14361, VDB-14360 and VDB-14359 are pretty similar. If you want to get best quality of vulnerability data, you may have to visit VulDB.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.microsoft.com/
- Product: https://www.microsoft.com/en-us/windows
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 9.8VulDB Meta Temp Score: 9.2
VulDB Base Score: 9.8
VulDB Temp Score: 9.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Privileges managementCWE: CWE-269 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Highly functional
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: ConfigStatus: 🔍
0-Day Time: 🔍
Timeline
08/24/1995 🔍01/01/1999 🔍
01/01/1999 🔍
01/01/1999 🔍
01/19/2003 🔍
06/19/2014 🔍
04/18/2026 🔍
Sources
Vendor: microsoft.comProduct: microsoft.com
Status: Not defined
CVE: CVE-1999-0584 (🔍)
GCVE (CVE): GCVE-0-1999-0584
GCVE (VulDB): GCVE-100-14362
X-Force: 195
Vulnerability Center: 668 - CVE Id, Critical
scip Labs: https://www.scip.ch/en/?labs.20140213
See also: 🔍
Entry
Created: 06/20/2014 01:01Updated: 04/18/2026 00:52
Changes: 06/20/2014 01:01 (42), 05/08/2019 08:20 (16), 04/18/2026 00:52 (20)
Complete: 🔍
Cache ID: 216::103
If you want to get best quality of vulnerability data, you may have to visit VulDB.
No comments yet. Languages: en.
Please log in to comment.