Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0157: Cisco PIX firewall and CBAC IP fragmentation attack results in a denial of service.

0
Medium
VulnerabilityCVE-1999-0157cve-1999-0157denial of service
Published: Tue Aug 18 1998 (08/18/1998, 04:00:00 UTC)
Source: NVD
Vendor/Project: cisco
Product: ios

Description

Cisco PIX firewall and CBAC IP fragmentation attack results in a denial of service.

AI-Powered Analysis

AILast updated: 07/01/2025, 21:42:44 UTC

Technical Analysis

CVE-1999-0157 is a vulnerability affecting Cisco PIX firewalls and Cisco IOS-based CBAC (Context-Based Access Control) implementations. The issue arises from improper handling of IP fragmentation, which can be exploited by an attacker to cause a denial of service (DoS) condition. Specifically, the vulnerability allows an unauthenticated remote attacker to send specially crafted fragmented IP packets that the firewall or CBAC fails to properly reassemble or process. This leads to resource exhaustion or a crash, effectively disrupting normal firewall operations and blocking legitimate traffic. The affected Cisco IOS versions include 11.2p, 11.3t, 12.0, 12.0t, and PIX OS version 4.2(1). The CVSS v2 base score is 5.0 (medium severity), reflecting that the attack can be launched remotely without authentication and requires low attack complexity, but impacts only availability without compromising confidentiality or integrity. No patches are available for this vulnerability, and there are no known exploits in the wild. The vulnerability dates back to 1998, indicating that it primarily affects legacy systems that have not been updated or replaced. Given the age of the vulnerability and lack of patch availability, organizations still running these older Cisco PIX or IOS versions remain at risk of service disruption if targeted by this IP fragmentation attack.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential for denial of service on critical network security infrastructure. Cisco PIX firewalls and CBAC were widely deployed in enterprise and service provider networks during the late 1990s and early 2000s. Organizations still operating legacy Cisco devices with these affected versions could experience network outages, degraded security posture, and interruption of business operations if targeted. This could affect availability of internal and external services, potentially impacting sectors reliant on continuous network connectivity such as finance, healthcare, telecommunications, and government. While the vulnerability does not allow data theft or modification, the loss of firewall functionality can expose networks to further attacks or unauthorized access if fallback security controls are not in place. The lack of available patches means organizations must rely on network segmentation, traffic filtering, or device replacement to mitigate risk. Given the age of the vulnerability, most modern Cisco devices are not affected, but legacy systems in European organizations with long hardware refresh cycles remain vulnerable.

Mitigation Recommendations

Since no patches are available for CVE-1999-0157, European organizations should prioritize the following mitigations: 1) Identify and inventory all Cisco PIX firewalls and IOS devices running affected versions (11.2p, 11.3t, 12.0, 12.0t, 4.2(1)). 2) Plan and execute hardware and software upgrades to supported, patched Cisco platforms that do not have this vulnerability. 3) Implement network-level filtering to block suspicious fragmented IP packets or malformed traffic patterns that could trigger the vulnerability, using upstream firewalls or intrusion prevention systems. 4) Employ strict network segmentation to isolate legacy devices from critical infrastructure and limit exposure to untrusted networks. 5) Monitor network traffic for unusual fragmentation patterns or firewall crashes indicative of exploitation attempts. 6) Develop incident response plans to quickly restore firewall functionality in case of DoS events. These steps go beyond generic advice by focusing on compensating controls and proactive network hygiene tailored to legacy device constraints.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7dea91

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 9:42:44 PM

Last updated: 2/7/2026, 5:19:20 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats