Skip to main content

CVE-1999-0016: Land IP denial of service.

Medium
VulnerabilityCVE-1999-0016cve-1999-0016denial of service
Published: Mon Dec 01 1997 (12/01/1997, 05:00:00 UTC)
Source: NVD
Vendor/Project: cisco
Product: ios

Description

Land IP denial of service.

AI-Powered Analysis

AILast updated: 07/01/2025, 22:57:16 UTC

Technical Analysis

CVE-1999-0016, commonly known as the Land IP denial of service vulnerability, is a network-based attack targeting Cisco IOS devices. The vulnerability arises from the way the affected Cisco IOS versions handle IP packets where the source and destination IP addresses are set to the same value, specifically the IP address of the target device itself. When such a crafted packet is received, the device enters a loop or crashes, resulting in a denial of service (DoS) condition. This vulnerability affects a wide range of Cisco IOS versions, including early releases such as 1.0, 1.1, 2.0, and multiple 4.x, 9.x, 10.x, and 11.x versions, reflecting its presence in many legacy systems. The attack vector is network-based (AV:N), requires no authentication (Au:N), has low attack complexity (AC:L), and impacts availability only (A:P), with no confidentiality or integrity impact. The vulnerability was published in 1997, and no official patches are available, likely due to the age of the affected software and the obsolescence of many impacted versions. Although no known exploits are currently active in the wild, the simplicity of the attack and the potential to disrupt network infrastructure make it a noteworthy threat, especially for legacy systems still in operation. The Land attack is one of the earliest documented DoS attacks and serves as a historical example of how malformed packets can disrupt network devices.

Potential Impact

For European organizations, the Land IP denial of service vulnerability poses a risk primarily to network infrastructure relying on legacy Cisco IOS devices that have not been updated or replaced. Successful exploitation results in denial of service, potentially causing network outages, loss of connectivity, and disruption of critical services. This can affect business operations, especially in sectors dependent on continuous network availability such as finance, telecommunications, healthcare, and government. While modern Cisco devices and IOS versions have long since mitigated this vulnerability, some industrial control systems, legacy network equipment, or specialized environments may still run vulnerable versions. The impact is mainly on availability, with no direct compromise of data confidentiality or integrity. However, network downtime can indirectly affect data access and operational continuity. Given the age of the vulnerability and the lack of active exploits, the immediate risk is low, but organizations with outdated infrastructure remain vulnerable to simple DoS attacks that could be launched by relatively unsophisticated attackers.

Mitigation Recommendations

Since no official patches are available for the affected legacy IOS versions, European organizations should prioritize the following mitigations: 1) Upgrade or replace legacy Cisco IOS devices with supported versions that have addressed this vulnerability. 2) Implement network-level filtering to block malformed packets with identical source and destination IP addresses, particularly those targeting internal network devices. 3) Deploy intrusion detection and prevention systems (IDS/IPS) configured to detect and block Land attack patterns. 4) Segment critical network infrastructure to limit exposure to untrusted networks and reduce the attack surface. 5) Monitor network traffic for unusual patterns indicative of Land or similar DoS attacks. 6) Establish incident response procedures to quickly isolate and recover affected devices in case of an attack. These steps go beyond generic advice by focusing on compensating controls for legacy systems where patching is not feasible.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7de876

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 10:57:16 PM

Last updated: 7/29/2025, 3:28:58 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats