Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-1306: Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache

0
High
VulnerabilityCVE-1999-1306cve-1999-1306
Published: Thu Dec 10 1992 (12/10/1992, 05:00:00 UTC)
Source: NVD
Vendor/Project: cisco
Product: ios

Description

Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the "established" keyword is set, which could allow attackers to bypass filters.

AI-Powered Analysis

AILast updated: 07/01/2025, 17:41:00 UTC

Technical Analysis

CVE-1999-1306 is a high-severity vulnerability affecting Cisco IOS versions 9.1 and earlier. The issue arises from improper handling of extended IP access control lists (ACLs) when the IP route cache is enabled and the 'established' keyword is used within the ACL configuration. The 'established' keyword is intended to allow return traffic for TCP sessions that have already been established, providing a stateful-like filtering mechanism in an otherwise stateless ACL environment. However, due to flawed processing in these IOS versions, attackers can exploit this vulnerability to bypass configured IP filters. This means that malicious traffic could circumvent security controls designed to restrict access or block unauthorized communications, potentially allowing unauthorized access, data exfiltration, or further network compromise. The vulnerability does not require authentication and can be exploited remotely over the network, increasing its risk profile. The CVSS v2 score of 7.5 reflects its high impact on confidentiality, integrity, and availability, combined with low attack complexity and no authentication requirement. Although this vulnerability dates back to 1992 and no patches are available, many legacy Cisco devices in operational environments might still be running affected IOS versions, especially in industrial or critical infrastructure networks where upgrades are challenging. The absence of known exploits in the wild suggests limited active exploitation, but the fundamental nature of the flaw means it remains a significant risk if vulnerable devices are exposed to untrusted networks.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, particularly for those relying on legacy Cisco IOS devices in their network infrastructure. Successful exploitation can lead to unauthorized bypass of network filtering controls, potentially allowing attackers to access sensitive internal systems, intercept or manipulate data, and disrupt network availability. Critical sectors such as finance, energy, telecommunications, and government agencies could face severe operational and reputational damage if attackers leverage this flaw to penetrate defenses. The ability to bypass ACLs undermines perimeter security, increasing the likelihood of lateral movement within networks and facilitating advanced persistent threats. Given the high integration of Cisco network equipment in European enterprise and service provider environments, the vulnerability could impact a broad range of organizations, especially those with legacy systems that have not been updated or segmented properly. Additionally, the lack of patches means organizations must rely on compensating controls to mitigate risk, which can be challenging in complex network environments.

Mitigation Recommendations

Since no patches are available for this vulnerability, European organizations should implement specific mitigations to reduce exposure. First, identify and inventory all Cisco IOS devices running version 9.1 or earlier and assess their exposure to untrusted networks. Where possible, upgrade to a supported IOS version that does not exhibit this vulnerability. If upgrading is not feasible, disable the IP route cache feature or avoid using the 'established' keyword in extended IP ACLs to prevent the flawed processing path. Network segmentation should be enhanced to isolate vulnerable devices from critical assets and limit exposure to potentially malicious traffic. Deploy additional security layers such as intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious traffic patterns that might exploit ACL bypass. Implement strict access controls and logging to detect anomalous activities early. Regularly review and update network ACLs to ensure they follow best practices and do not rely on vulnerable constructs. Finally, consider using alternative firewall or filtering solutions that provide stateful inspection capabilities to compensate for the limitations of legacy IOS ACLs.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32ab6fd31d6ed7de3da

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 5:41:00 PM

Last updated: 2/7/2026, 11:41:59 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats