Skip to main content

CVE-1999-0157: Cisco PIX firewall and CBAC IP fragmentation attack results in a denial of service.

Medium
VulnerabilityCVE-1999-0157cve-1999-0157denial of service
Published: Tue Aug 18 1998 (08/18/1998, 04:00:00 UTC)
Source: NVD
Vendor/Project: cisco
Product: ios

Description

Cisco PIX firewall and CBAC IP fragmentation attack results in a denial of service.

AI-Powered Analysis

AILast updated: 07/01/2025, 21:42:44 UTC

Technical Analysis

CVE-1999-0157 is a vulnerability affecting Cisco PIX firewalls and Cisco IOS-based CBAC (Context-Based Access Control) implementations. The issue arises from improper handling of IP fragmentation, which can be exploited by an attacker to cause a denial of service (DoS) condition. Specifically, the vulnerability allows an unauthenticated remote attacker to send specially crafted fragmented IP packets that the firewall or CBAC fails to properly reassemble or process. This leads to resource exhaustion or a crash, effectively disrupting normal firewall operations and blocking legitimate traffic. The affected Cisco IOS versions include 11.2p, 11.3t, 12.0, 12.0t, and PIX OS version 4.2(1). The CVSS v2 base score is 5.0 (medium severity), reflecting that the attack can be launched remotely without authentication and requires low attack complexity, but impacts only availability without compromising confidentiality or integrity. No patches are available for this vulnerability, and there are no known exploits in the wild. The vulnerability dates back to 1998, indicating that it primarily affects legacy systems that have not been updated or replaced. Given the age of the vulnerability and lack of patch availability, organizations still running these older Cisco PIX or IOS versions remain at risk of service disruption if targeted by this IP fragmentation attack.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential for denial of service on critical network security infrastructure. Cisco PIX firewalls and CBAC were widely deployed in enterprise and service provider networks during the late 1990s and early 2000s. Organizations still operating legacy Cisco devices with these affected versions could experience network outages, degraded security posture, and interruption of business operations if targeted. This could affect availability of internal and external services, potentially impacting sectors reliant on continuous network connectivity such as finance, healthcare, telecommunications, and government. While the vulnerability does not allow data theft or modification, the loss of firewall functionality can expose networks to further attacks or unauthorized access if fallback security controls are not in place. The lack of available patches means organizations must rely on network segmentation, traffic filtering, or device replacement to mitigate risk. Given the age of the vulnerability, most modern Cisco devices are not affected, but legacy systems in European organizations with long hardware refresh cycles remain vulnerable.

Mitigation Recommendations

Since no patches are available for CVE-1999-0157, European organizations should prioritize the following mitigations: 1) Identify and inventory all Cisco PIX firewalls and IOS devices running affected versions (11.2p, 11.3t, 12.0, 12.0t, 4.2(1)). 2) Plan and execute hardware and software upgrades to supported, patched Cisco platforms that do not have this vulnerability. 3) Implement network-level filtering to block suspicious fragmented IP packets or malformed traffic patterns that could trigger the vulnerability, using upstream firewalls or intrusion prevention systems. 4) Employ strict network segmentation to isolate legacy devices from critical infrastructure and limit exposure to untrusted networks. 5) Monitor network traffic for unusual fragmentation patterns or firewall crashes indicative of exploitation attempts. 6) Develop incident response plans to quickly restore firewall functionality in case of DoS events. These steps go beyond generic advice by focusing on compensating controls and proactive network hygiene tailored to legacy device constraints.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7dea91

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 9:42:44 PM

Last updated: 8/15/2025, 7:15:43 PM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats