Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0775: Cisco Gigabit Switch routers running IOS allow remote attackers to forward unauthorized packets due

0
High
VulnerabilityCVE-1999-0775cve-1999-0775
Published: Thu Jun 10 1999 (06/10/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: cisco
Product: ios

Description

Cisco Gigabit Switch routers running IOS allow remote attackers to forward unauthorized packets due to improper handling of the "established" keyword in an access list.

AI-Powered Analysis

AILast updated: 06/27/2025, 21:24:45 UTC

Technical Analysis

CVE-1999-0775 is a critical vulnerability affecting Cisco Gigabit Switch routers running specific versions of Cisco IOS, namely 11.2(14)gs2 and 11.2(15)g. The vulnerability arises from improper handling of the "established" keyword within access control lists (ACLs). ACLs are used to filter network traffic and enforce security policies by permitting or denying packets based on defined criteria. The "established" keyword is intended to allow return traffic for TCP connections that have already been established, thus facilitating legitimate bidirectional communication. However, due to flawed processing of this keyword, remote attackers can exploit this vulnerability to forward unauthorized packets through the router. This effectively allows attackers to bypass ACL restrictions, potentially enabling unauthorized access, data exfiltration, or lateral movement within the network. The vulnerability requires no authentication and can be exploited remotely over the network, making it highly accessible to attackers. The CVSS v2 score of 10.0 reflects the maximum severity, indicating complete compromise of confidentiality, integrity, and availability without any user interaction or authentication. Despite its age, this vulnerability remains significant for any legacy systems still running the affected IOS versions. No patches are available, which means mitigation relies on network design and compensating controls. The lack of known exploits in the wild suggests limited active exploitation, but the potential impact remains severe if exploited.

Potential Impact

For European organizations, the impact of CVE-1999-0775 can be substantial, especially for those relying on legacy Cisco Gigabit Switch routers with the affected IOS versions. Successful exploitation could lead to unauthorized network traffic forwarding, allowing attackers to circumvent security policies, access sensitive internal resources, intercept or manipulate data, and disrupt network operations. This can compromise the confidentiality and integrity of critical business information and disrupt availability of network services. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, face heightened risks of regulatory non-compliance and reputational damage. Additionally, the ability to bypass ACLs could facilitate further attacks, including lateral movement and deployment of malware within corporate networks. Given the critical nature of network infrastructure, exploitation could also impact supply chain partners and customers, amplifying the overall risk.

Mitigation Recommendations

Since no patches are available for the affected IOS versions, European organizations should prioritize the following mitigation strategies: 1) Immediate identification and inventory of Cisco Gigabit Switch routers running the vulnerable IOS versions. 2) Upgrade or replace affected devices with supported Cisco IOS versions that have addressed this vulnerability. If upgrading is not immediately feasible, consider network segmentation to isolate vulnerable devices from critical assets and sensitive data. 3) Implement strict ingress and egress filtering on network boundaries to restrict unauthorized traffic flows and reduce exposure. 4) Employ additional security controls such as intrusion detection/prevention systems (IDS/IPS) to monitor for anomalous traffic patterns indicative of exploitation attempts. 5) Regularly audit and review ACL configurations to ensure they do not rely solely on the "established" keyword and consider alternative filtering strategies that do not expose this weakness. 6) Enhance network monitoring and logging to detect suspicious activities promptly. 7) Develop and test incident response plans specifically addressing potential exploitation of network infrastructure vulnerabilities. These tailored measures go beyond generic advice by focusing on compensating controls and operational practices suitable for legacy infrastructure.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7df078

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 9:24:45 PM

Last updated: 2/7/2026, 6:48:18 PM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats