IOIoT Support Risk
CVE

CVE-1999-1466

Vulnerability in Cisco routers versions 8.2 through 9.1 allows remote attackers to bypass access control lists when extended IP access lists are used on certain interfaces, the IP route cache is enabled, and the access list uses the "established" keyword.

What this profile means

This public preview summarizes the normalized record without exposing paid citation paths. Use it to decide whether the device deserves a paid report, workspace review, or direct source verification.

Record typedevice
CategoryCVE
StatusNVD CVE record
Confidence90
CVECVE-1999-1466

Source coverage preview

Public pages show source names and record counts. Paid reports unlock source URLs, citation paths, and report-generation context.

Source rows checked2
Max source confidence90
Latest source observationMay 18, 2026
CitationsLocked in paid report
  • NIST NVD CVE API

Paid report value

  • Device/security signal snapshot
  • Known exploited and exploitability interpretation where available
  • Remediation and inventory-mapping checklist
  • Locked source citations and monitoring path

For records that need deeper review, use the main access flow to request source-backed report context, saved workspace review, or support before relying on the public preview.

Methodology and limits

Source-backed, but still worth verifying for high-impact use.

Security records are triage intelligence and should be validated against asset inventory, firmware versions, compensating controls, and vendor advisories.

For security teams

Prioritize known exploited and high-confidence records.

For buyers

Check support and vulnerability signals before purchase.

For MSPs

Use reports and monitors for customer device review.

Questions to ask before relying on this record

Paid reports include citation paths and report-generation context; public previews intentionally hide source URLs.

CVE-1999-1466 CVE Report | DataVerityHub