Skip to main content

CVE-1999-0162: The "established" keyword in some Cisco IOS software allowed an attacker to bypass filtering.

Medium
VulnerabilityCVE-1999-0162cve-1999-0162
Published: Tue Sep 01 1998 (09/01/1998, 04:00:00 UTC)
Source: NVD
Vendor/Project: cisco
Product: ios

Description

The "established" keyword in some Cisco IOS software allowed an attacker to bypass filtering.

AI-Powered Analysis

AILast updated: 07/01/2025, 21:41:58 UTC

Technical Analysis

CVE-1999-0162 is a medium-severity vulnerability affecting Cisco IOS software, specifically version 11.2. The vulnerability arises from the use of the "established" keyword in access control lists (ACLs) configured on Cisco IOS routers. The "established" keyword is intended to allow return traffic for TCP connections that were initiated from inside the network, thereby simplifying ACL rules. However, in the affected versions, this keyword could be exploited by an attacker to bypass filtering rules. This means that an attacker could craft packets that appear to be part of an established connection and thus evade ACL restrictions, potentially gaining unauthorized access or exfiltrating data. The vulnerability does not require authentication and can be exploited remotely over the network, with low attack complexity. The impact is primarily on confidentiality, as unauthorized traffic can pass through the router's filtering mechanisms. There is no known patch available for this vulnerability, and no known exploits have been reported in the wild. Given the age of the vulnerability (published in 1998) and the affected software version, it is likely that modern Cisco IOS versions have addressed this issue, but legacy systems running version 11.2 remain at risk.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to network perimeter security if legacy Cisco IOS 11.2 routers are still in operation. An attacker exploiting this flaw could bypass ACLs designed to restrict inbound or outbound traffic, potentially allowing unauthorized access to internal network resources or enabling data exfiltration. This could lead to breaches of sensitive information, disruption of network segmentation, and compromise of internal systems. Given the medium severity and the lack of known exploits, the immediate risk may be limited; however, organizations with outdated network infrastructure could face increased exposure. The impact is heightened for critical infrastructure providers, financial institutions, and government agencies in Europe that rely on Cisco IOS routers for secure network operations. Additionally, the absence of a patch means organizations must rely on alternative mitigation strategies to reduce risk.

Mitigation Recommendations

Since no patch is available for this vulnerability, European organizations should take the following specific steps: 1) Identify and inventory all Cisco IOS devices running version 11.2 or other potentially vulnerable versions. 2) Upgrade affected devices to a supported Cisco IOS version where this vulnerability is resolved. If upgrading is not immediately feasible, consider isolating these devices from untrusted networks or limiting their exposure. 3) Review and revise ACL configurations to avoid reliance on the "established" keyword. Instead, implement more granular and explicit ACL rules that do not depend on this keyword to control traffic flow. 4) Employ additional network security controls such as stateful firewalls, intrusion detection/prevention systems (IDS/IPS), and network segmentation to compensate for potential ACL bypass. 5) Monitor network traffic for anomalous patterns that could indicate attempts to exploit this vulnerability, focusing on unexpected TCP packets that might mimic established connections. 6) Implement strict network access controls and logging to detect and respond to suspicious activities promptly.

Need more detailed analysis?Get Pro

Threat ID: 682ca32bb6fd31d6ed7deaa8

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 7/1/2025, 9:41:58 PM

Last updated: 7/30/2025, 11:24:01 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats