Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0667: The ARP protocol allows any host to spoof ARP replies and poison the ARP cache to conduct IP address

0
High
VulnerabilityCVE-1999-0667cve-1999-0667denial of service
Published: Fri Sep 19 1997 (09/19/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: arp_protocol
Product: arp_protocol

Description

The ARP protocol allows any host to spoof ARP replies and poison the ARP cache to conduct IP address spoofing or a denial of service.

AI-Powered Analysis

AILast updated: 06/30/2025, 19:57:19 UTC

Technical Analysis

CVE-1999-0667 identifies a fundamental vulnerability in the Address Resolution Protocol (ARP), which is used to map IP addresses to MAC addresses within local area networks. The vulnerability arises because ARP lacks any authentication mechanism, allowing any host on the same local network segment to send spoofed ARP replies. This spoofing can poison the ARP cache of other devices, causing them to associate an IP address with a malicious MAC address controlled by the attacker. As a result, attackers can perform man-in-the-middle (MITM) attacks, intercepting, modifying, or blocking network traffic. Additionally, attackers can conduct denial of service (DoS) attacks by poisoning ARP caches with invalid mappings, disrupting normal network communications. The vulnerability has a CVSS score of 10, indicating critical severity with network vector, low attack complexity, no authentication required, and full impact on confidentiality, integrity, and availability. Despite its age and fundamental nature, this vulnerability remains relevant because ARP is still widely used in IPv4 networks, and the protocol itself has not been redesigned to include security features. No official patches exist since ARP is a protocol standard rather than a software product, so mitigation relies on network design and security controls rather than software updates.

Potential Impact

For European organizations, the impact of ARP spoofing can be significant, especially in environments relying heavily on IPv4 LANs such as corporate offices, data centers, and industrial control systems. Successful exploitation can lead to interception of sensitive data, including credentials and confidential communications, undermining data confidentiality and integrity. It can also disrupt network availability by causing denial of service conditions. This can affect critical infrastructure sectors such as finance, healthcare, manufacturing, and government agencies, potentially leading to operational disruptions and regulatory compliance issues under GDPR and other data protection laws. The ease of exploitation means that attackers with local network access, including malicious insiders or compromised devices, can leverage this vulnerability to escalate attacks or move laterally within networks.

Mitigation Recommendations

Mitigation requires a multi-layered approach beyond generic advice: 1) Implement Dynamic ARP Inspection (DAI) on managed switches to validate ARP packets against trusted DHCP snooping databases, preventing unauthorized ARP replies. 2) Use static ARP entries for critical servers and network devices where feasible to eliminate reliance on dynamic ARP resolution. 3) Segment networks using VLANs to limit the broadcast domain and reduce the attack surface for ARP spoofing. 4) Deploy network intrusion detection systems (NIDS) with ARP spoofing detection capabilities to alert on suspicious ARP activity. 5) Employ encrypted communication protocols (e.g., TLS, IPsec) to protect data even if ARP spoofing occurs. 6) Regularly audit and monitor network traffic for anomalies indicative of ARP poisoning. 7) Educate network administrators and users about the risks and signs of ARP spoofing attacks.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32bb6fd31d6ed7de7d9

Added to database: 5/20/2025, 3:43:39 PM

Last enriched: 6/30/2025, 7:57:19 PM

Last updated: 2/7/2026, 7:28:38 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats