Search criteria

25 vulnerabilities found for seil\/b1 by iij

VAR-201502-0480

Vulnerability from variot - Updated: 2025-04-13 23:41

npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing SSTP packets.Receiving a specially crafted SSTP packet may result in the device becoming unresponsive. There are security vulnerabilities in the npppd program in PPPAC for several SEIL routers. SEIL Series Routers are prone to a remote denial-of-service vulnerability. An attacker can leverage this issue to consume resources resulting in denial-of-service condition; denying service to legitimate users. The following products are vulnerable: SEIL/x86 Fuji 1.00 through 3.30 SEIL/X1 3.50 through 4.70 SEIL/X2 3.50 through 4.70 SEIL/B1 3.50 through 4.70. The following products and versions are affected: SEIL SEIL/x86 Fuji routers from version 1.00 to version 3.30, SEIL/X1 routers from version 3.50 to version 4.70, SEIL/X2 routers from version 3.50 to version 4.70, SEIL/B1 routers from version 3.50 to version 4.70

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201502-0480",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.29"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.32"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.26"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.33"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.31"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.34"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.28"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.27"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.35"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.90"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.71"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.70"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.00"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.90"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.79"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.02"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.75"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.32"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.15"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.79"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.64"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.91"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.90"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.09"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.11"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.53"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.74"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.98"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.60"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.81"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.55"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.22"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.75"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.83"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.89"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.75"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.58"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.00"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.72"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.04"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.99"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.93"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.14"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.30"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.95"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.34"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.94"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.03"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.10"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.49"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.70"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.92"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.08"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.59"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.51"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.07"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.86"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.77"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.47"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.53"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.76"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.96"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.68"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.34"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.97"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.02"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.16"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.03"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.70"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.60"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.19"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.45"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.73"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.54"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.93"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.06"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.90"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.41"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.00"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.69"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.71"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.04"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.32"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.82"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.12"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.07"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.01"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.18"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.51"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.20"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.08"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.34"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.40"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.21"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.91"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.78"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.41"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.43"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.81"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.00"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.53"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.84"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.21"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.73"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.56"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.24"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.23"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.99"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.48"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.60"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.95"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.06"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.25"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.76"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.98"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.37"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.88"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.19"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.87"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.40"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.78"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.84"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.18"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.00"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.91"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.67"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.85"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.70"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.74"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.53"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.51"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.66"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.39"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.60"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.38"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.09"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.92"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.87"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.75"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.40"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.11"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.70"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.01"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.16"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.86"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.13"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.65"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.80"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.41"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.89"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.91"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.85"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.70"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.12"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.88"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.60"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.17"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.05"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.90"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.14"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.17"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.75"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.83"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.32"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.46"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.15"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.57"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.70"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.96"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.91"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.94"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.77"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.36"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.82"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.13"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.60"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.44"
      },
      {
        "model": "seil x86 fuji",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.97"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "3.50 to 4.70"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "3.50 to 4.70"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "3.50 to 4.70"
      },
      {
        "model": "seil/x86 fuji",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 3.30"
      },
      {
        "model": "seil/b1 routers",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "seil",
        "version": "3.50-4.70"
      },
      {
        "model": "seil/x2 routers",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "seil",
        "version": "3.50-4.70"
      },
      {
        "model": "seil/x1 router",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "seil",
        "version": "3.50-4.70"
      },
      {
        "model": "seil/x86 fuji routers",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "seil",
        "version": "1.00-3.30"
      },
      {
        "model": "seil/x86 fuji",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.30"
      },
      {
        "model": "seil/x86 fuji",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.22"
      },
      {
        "model": "seil/x86 fuji",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.70"
      },
      {
        "model": "seil/x86 fuji",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.70"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.62"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.50"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.32"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.30"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.50"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.70"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.62"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.50"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.32"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.30"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.50"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.70"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.62"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.50"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.32"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.30"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.50"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      },
      {
        "db": "BID",
        "id": "72884"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-477"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0887"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fb1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx2",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil_x86_fuji",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "JPCERT",
    "sources": [
      {
        "db": "BID",
        "id": "72884"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2015-0887",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2015-0887",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Partial",
            "baseScore": 4.3,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2015-000031",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2015-01395",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-78833",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2015-0887",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2015-000031",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2015-01395",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201502-477",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-78833",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      },
      {
        "db": "VULHUB",
        "id": "VHN-78833"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-477"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0887"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing SSTP packets.Receiving a specially crafted SSTP packet may result in the device becoming unresponsive. There are security vulnerabilities in the npppd program in PPPAC for several SEIL routers. SEIL Series Routers are prone to a remote denial-of-service vulnerability. \nAn attacker can leverage this issue to consume resources resulting in denial-of-service condition; denying service to legitimate users. \nThe following products are vulnerable:\nSEIL/x86 Fuji 1.00 through 3.30\nSEIL/X1 3.50 through 4.70\nSEIL/X2 3.50 through 4.70\nSEIL/B1 3.50 through 4.70. The following products and versions are affected: SEIL SEIL/x86 Fuji routers from version 1.00 to version 3.30, SEIL/X1 routers from version 3.50 to version 4.70, SEIL/X2 routers from version 3.50 to version 4.70, SEIL/B1 routers from version 3.50 to version 4.70",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-0887"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      },
      {
        "db": "BID",
        "id": "72884"
      },
      {
        "db": "VULHUB",
        "id": "VHN-78833"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-0887",
        "trust": 3.4
      },
      {
        "db": "JVN",
        "id": "JVN63949115",
        "trust": 2.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-000031",
        "trust": 2.5
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-477",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-01395",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "72884",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-78833",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      },
      {
        "db": "VULHUB",
        "id": "VHN-78833"
      },
      {
        "db": "BID",
        "id": "72884"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-477"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0887"
      }
    ]
  },
  "id": "VAR-201502-0480",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      },
      {
        "db": "VULHUB",
        "id": "VHN-78833"
      }
    ],
    "trust": 1.4576923075
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      }
    ]
  },
  "last_update_date": "2025-04-13T23:41:25.477000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Internet Initiative Japan Inc. website",
        "trust": 0.8,
        "url": "http://www.seil.jp/support/security/a01541.html"
      },
      {
        "title": "SEIL Router PPP Access Concentrator Denial of Service Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/55765"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-399",
        "trust": 1.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-78833"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0887"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://jvn.jp/en/jp/jvn63949115/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.seil.jp/support/security/a01541.html"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/jvndb/jvndb-2015-000031"
      },
      {
        "trust": 1.4,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0887"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0887"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/"
      },
      {
        "trust": 0.3,
        "url": " http://www.seil.jp/support/security/a01541.html  "
      },
      {
        "trust": 0.3,
        "url": "jvn.jp/en/jp/jvn63949115/index.html"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      },
      {
        "db": "VULHUB",
        "id": "VHN-78833"
      },
      {
        "db": "BID",
        "id": "72884"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-477"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0887"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      },
      {
        "db": "VULHUB",
        "id": "VHN-78833"
      },
      {
        "db": "BID",
        "id": "72884"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-477"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-0887"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-03-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      },
      {
        "date": "2015-02-28T00:00:00",
        "db": "VULHUB",
        "id": "VHN-78833"
      },
      {
        "date": "2015-02-27T00:00:00",
        "db": "BID",
        "id": "72884"
      },
      {
        "date": "2015-02-27T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      },
      {
        "date": "2015-02-27T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201502-477"
      },
      {
        "date": "2015-02-28T02:59:37.923000",
        "db": "NVD",
        "id": "CVE-2015-0887"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-03-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-01395"
      },
      {
        "date": "2015-03-04T00:00:00",
        "db": "VULHUB",
        "id": "VHN-78833"
      },
      {
        "date": "2015-05-07T17:28:00",
        "db": "BID",
        "id": "72884"
      },
      {
        "date": "2015-03-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      },
      {
        "date": "2015-03-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201502-477"
      },
      {
        "date": "2025-04-12T10:46:40.837000",
        "db": "NVD",
        "id": "CVE-2015-0887"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-477"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL Series routers vulnerable to denial-of-service (DoS)",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-000031"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "resource management error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201502-477"
      }
    ],
    "trust": 0.6
  }
}

VAR-201406-0099

Vulnerability from variot - Updated: 2025-04-13 23:21

The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to an issue in processing certain packets. (CWE-119)By receiving a specially crafted TCP packet, a session established using PPPAC may be disconnected or stop accepting connections. SEIL is a series of router devices. SEIL Series Routers are prone to a remote denial-of-service vulnerability. An attacker can leverage this issue to cause denial-of-service conditions; denying service to legitimate users. The following are vulnerable: SEIL/x86 1.00 to 3.10 SEIL/X1 1.00 to 4.50 SEIL/X2 1.00 to 4.50 SEIL/B1 1.00 to 4.50 SEIL/Turbo 1.80 to 2.17 SEIL/neu 2FE Plus 1.80 to 2.17. The following router products are affected: SEIL SEIL/x86 Routers Versions 1.00 to 3.10, SEIL/X1 Routers Versions 1.00 to 4.50, SEIL/X2 Routers Versions 1.00 to 4.50, SEIL/B1 Routers Versions 1.00 to 4.50, SEIL/Turbo Routers 1.80 to 2.17 Version, SEIL/neu 2FE Plus router version 1.80 to 2.17

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201406-0099",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.82"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.17"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.15"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "3.10"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.16"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.81"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.15"
      },
      {
        "model": "seil\\%2fx2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.16"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.80"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\%2fx2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fx2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.50"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.32"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.32"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.50"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.17"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x86",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil/b1",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.50"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.80 to 2.17"
      },
      {
        "model": "seil/turbo",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/turbo",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.80 to 2.17"
      },
      {
        "model": "seil/x1",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.50"
      },
      {
        "model": "seil/x2",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.50"
      },
      {
        "model": "seil/x86",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 3.10"
      },
      {
        "model": "seil/neu 2fe plus to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.802.17"
      },
      {
        "model": "seil/turbo to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.802.17"
      },
      {
        "model": "seil/b1 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.004.50"
      },
      {
        "model": "seil/x2 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.004.50"
      },
      {
        "model": "seil/x1 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.004.50"
      },
      {
        "model": "seil/x86 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.003.10"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.35"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.61"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.60"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "BID",
        "id": "68041"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fb1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fb1_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fneu_2fe_plus",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fneu_2fe_plus_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fturbo",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fturbo_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx1_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx2",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx86",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx86_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "68041"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2014-2004",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2014-2004",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2014-000055",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2014-03732",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-69943",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2014-2004",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2014-000055",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-03732",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201406-323",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-69943",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to an issue in processing certain packets. (CWE-119)By receiving a specially crafted TCP packet, a session established using PPPAC may be disconnected or stop accepting connections. SEIL is a series of router devices. SEIL Series Routers are prone to a remote denial-of-service vulnerability. \nAn attacker can leverage this issue to cause denial-of-service conditions; denying service to legitimate users. \nThe following are vulnerable:\nSEIL/x86 1.00 to 3.10\nSEIL/X1 1.00 to 4.50\nSEIL/X2 1.00 to 4.50\nSEIL/B1 1.00 to 4.50\nSEIL/Turbo 1.80 to 2.17\nSEIL/neu 2FE Plus 1.80 to 2.17. The following router products are affected: SEIL SEIL/x86 Routers Versions 1.00 to 3.10, SEIL/X1 Routers Versions 1.00 to 4.50, SEIL/X2 Routers Versions 1.00 to 4.50, SEIL/B1 Routers Versions 1.00 to 4.50, SEIL/Turbo Routers 1.80 to 2.17 Version, SEIL/neu 2FE Plus router version 1.80 to 2.17",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "BID",
        "id": "68041"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-2004",
        "trust": 3.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055",
        "trust": 2.5
      },
      {
        "db": "JVN",
        "id": "JVN10724763",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "68041",
        "trust": 1.0
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "db": "BID",
        "id": "68041"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      }
    ]
  },
  "id": "VAR-201406-0099",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      }
    ],
    "trust": 1.1894899984615384
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      }
    ]
  },
  "last_update_date": "2025-04-13T23:21:26.353000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Internet Initiative Japan Inc. website",
        "trust": 0.8,
        "url": "http://www.seil.jp/support/security/a01443.html"
      },
      {
        "title": "SEIL Series Routers patch for remote denial of service vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/46479"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://jvn.jp/en/jp/jvn10724763/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.seil.jp/support/security/a01443.html"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/jvndb/jvndb-2014-000055"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2004"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2004"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/68041"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "db": "BID",
        "id": "68041"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "db": "BID",
        "id": "68041"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-2004"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-06-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "date": "2014-06-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "date": "2014-06-13T00:00:00",
        "db": "BID",
        "id": "68041"
      },
      {
        "date": "2014-06-13T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "date": "2014-06-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      },
      {
        "date": "2014-06-16T14:55:05.893000",
        "db": "NVD",
        "id": "CVE-2014-2004"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-06-18T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-03732"
      },
      {
        "date": "2014-06-16T00:00:00",
        "db": "VULHUB",
        "id": "VHN-69943"
      },
      {
        "date": "2014-06-13T00:00:00",
        "db": "BID",
        "id": "68041"
      },
      {
        "date": "2014-06-17T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      },
      {
        "date": "2014-06-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      },
      {
        "date": "2025-04-12T10:46:40.837000",
        "db": "NVD",
        "id": "CVE-2014-2004"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL Series routers vulnerable to denial-of-service (DoS)",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-000055"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201406-323"
      }
    ],
    "trust": 0.6
  }
}

VAR-201309-0394

Vulnerability from variot - Updated: 2025-04-11 23:14

Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message. SEIL Series routers contain a buffer overflow vulnerability. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contains a buffer overflow vulnerability in processing L2TP messages.An attacker may execute an arbitrary code on the vulnerable system. The SEIL Router is a router from Japan's SEIL vendors. SEIL series routers, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow vulnerability because they fails to sufficiently bounds check user-supplied data Attackers can exploit this issue to execute arbitrary code in context of the affected device or cause denial-of-service conditions. SEIL/x86, etc. The following products and versions are affected: SEIL/x86 devices with firmware prior to 2.82, SEIL/X1 devices with firmware prior to 4.32, SEIL/X2 devices with firmware prior to 4.32, SEIL/B1 devices with firmware prior to 4.32 , SEIL/Turbo devices using firmware earlier than 2.16, and SEIL/neu 2FE Plus devices using firmware earlier than 2.16

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201309-0394",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.15"
      },
      {
        "model": "seil x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.81"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.15"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x86",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.31"
      },
      {
        "model": "seil/b1",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.31"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "2.05 to 2.15"
      },
      {
        "model": "seil/turbo",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/turbo",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "2.05 to 2.15"
      },
      {
        "model": "seil/x1",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.31"
      },
      {
        "model": "seil/x2",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.31"
      },
      {
        "model": "seil/x86",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 2.81"
      },
      {
        "model": "seil/neu 2fe plus to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "2.052.15"
      },
      {
        "model": "seil/turbo to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "2.052.15"
      },
      {
        "model": "seil/b1 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.004.31"
      },
      {
        "model": "seil/x2 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.004.31"
      },
      {
        "model": "seil/x1 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.004.31"
      },
      {
        "model": "seil/x86 to",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.002.81"
      },
      {
        "model": "neu 2fe plus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.15"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.60"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.61"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "turbo",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.16"
      },
      {
        "model": "turbo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.10"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.35"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "neu 2fe plus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.10"
      },
      {
        "model": "seil/x1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.32"
      },
      {
        "model": "seil/b1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.32"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "neu 2fe plus",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.16"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "turbo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.11"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "turbo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.05"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "neu 2fe plus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.11"
      },
      {
        "model": "neu 2fe plus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.05"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x86",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.82"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/x2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.32"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.81"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "turbo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.15"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "BID",
        "id": "62593"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fb1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fb1_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fneu_2fe_plus",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fneu_2fe_plus_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fturbo",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fturbo_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx1_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx2",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx86",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx86_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "62593"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-4709",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2013-4709",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Partial",
            "baseScore": 7.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2013-000092",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2013-13230",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-64711",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-4709",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2013-000092",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-13230",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201309-351",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-64711",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message. SEIL Series routers contain a buffer overflow vulnerability. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contains a buffer overflow vulnerability in processing L2TP messages.An attacker may execute an arbitrary code on the vulnerable system. The SEIL Router is a router from Japan\u0027s SEIL vendors. SEIL series routers, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow  vulnerability because they fails to sufficiently bounds check user-supplied data\nAttackers can exploit this issue to execute  arbitrary code in context of the  affected device or cause denial-of-service conditions. SEIL/x86, etc. The following products and versions are affected: SEIL/x86 devices with firmware prior to 2.82, SEIL/X1 devices with firmware prior to 4.32, SEIL/X2 devices with firmware prior to 4.32, SEIL/B1 devices with firmware prior to 4.32 , SEIL/Turbo devices using firmware earlier than 2.16, and SEIL/neu 2FE Plus devices using firmware earlier than 2.16",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "BID",
        "id": "62593"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-4709",
        "trust": 3.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092",
        "trust": 2.8
      },
      {
        "db": "JVN",
        "id": "JVN43152129",
        "trust": 2.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230",
        "trust": 0.6
      },
      {
        "db": "JVN",
        "id": "JVN#43152129",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "62593",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "db": "BID",
        "id": "62593"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      }
    ]
  },
  "id": "VAR-201309-0394",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      }
    ],
    "trust": 1.1692246653333331
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      }
    ]
  },
  "last_update_date": "2025-04-11T23:14:41.938000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Internet Initiative Japan Inc. website",
        "trust": 0.8,
        "url": "http://www.seil.jp/support/security/a01396.html"
      },
      {
        "title": "Patch for SEIL Series Router PPPACL L2TP Message Processing Buffer Overflow Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/39771"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://www.seil.jp/support/security/a01396.html"
      },
      {
        "trust": 2.0,
        "url": "http://jvn.jp/en/jp/jvn43152129/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/jvndb/jvndb-2013-000092"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4709"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/en/jp/jvn43152129/"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=http://support.apple.com/kb/cve-2013-4709"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/download/firmware/"
      },
      {
        "trust": 0.3,
        "url": "http://jvndb.jvn.jp/en/contents/2013/jvndb-2013-000092.html"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "db": "BID",
        "id": "62593"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "db": "BID",
        "id": "62593"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4709"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-09-24T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "BID",
        "id": "62593"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "date": "2013-09-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      },
      {
        "date": "2013-09-20T15:26:04.230000",
        "db": "NVD",
        "id": "CVE-2013-4709"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-09-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-13230"
      },
      {
        "date": "2015-03-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-64711"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "BID",
        "id": "62593"
      },
      {
        "date": "2013-09-30T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      },
      {
        "date": "2014-06-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      },
      {
        "date": "2025-04-11T00:51:21.963000",
        "db": "NVD",
        "id": "CVE-2013-4709"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL Series routers vulnerable to buffer overflow",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000092"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-351"
      }
    ],
    "trust": 0.6
  }
}

VAR-201103-0115

Vulnerability from variot - Updated: 2025-04-11 23:07

Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet. SEIL Series routers contain a buffer overflow vulnerability. Accoding to the developer, all versions of SEIL/86, SEIL/B1, SEIL/X1, SEIL/X2 3.00 through 3.11 process PPPoE packets in a non-administrative mode of operation, therefore the affect of this vulnerability is limited to the PPPAC service being stopped. A security vulnerability exists in the SEIL router that allows malicious users to compromise the target system. Sending a specially crafted message can execute arbitrary code in the context of the application. Multiple SEIL products, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow vulnerability. Failed exploit attempts will result in a denial-of-service condition. SEIL Router is a router produced by Japanese SEIL manufacturer. ----------------------------------------------------------------------

Meet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March).

http://secunia.com/company/events/mms_2011/


TITLE: SEIL Routers PPP Access Concentrator Buffer Overflow Vulnerability

SECUNIA ADVISORY ID: SA43494

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43494/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43494

RELEASE DATE: 2011-03-18

DISCUSS ADVISORY: http://secunia.com/advisories/43494/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/43494/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=43494

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: A vulnerability has been reported in SEIL Routers, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is reported in the following products: * SEIL/x86 firmware 1.00 to 1.61. * SEIL/B1 firmware 1.00 to 3.11. * SEIL/X1 firmware 1.00 to 3.11. * SEIL/X2 firmware 1.00 to 3.11. * SEIL/Turbo firmware 1.80 to 2.10.

SOLUTION: Update to a patched version.

Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: http://www.seil.jp/support/security/a01001.html

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201103-0115",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "3.11"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.82"
      },
      {
        "model": "seil\\/x86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/x86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.61"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.04"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "3.01"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.81"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "3.10"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.84"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.01"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.32"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.92"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.30"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.83"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.11"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.00"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.43"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.93"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.44"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.08"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.21"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.75"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.99"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.02"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.74"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.02"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.74"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.02"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.06"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.07"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.91"
      },
      {
        "model": "seil\\/x86",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.32"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.01"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.30"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.41"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.94"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.09"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.43"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.44"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.83"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.00"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.08"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.95"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.73"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.96"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.22"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.85"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.90"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.02"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.84"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.06"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.81"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.41"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.20"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.10"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.98"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.94"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.31"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.03"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.09"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.11"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.73"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.10"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.22"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.95"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.96"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.90"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.85"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.75"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.40"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.20"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.10"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.01"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.31"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.01"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.98"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.04"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.03"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.92"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.11"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.73"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.10"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.93"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.75"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.40"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.11"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.82"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.99"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.21"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.07"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.91"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.74"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "3.02"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.01"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "turbo",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.80"
      },
      {
        "model": "turbo",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "2.10"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.61"
      },
      {
        "model": "neu 2fe plus",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.80"
      },
      {
        "model": "neu 2fe plus",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "2.10"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 3.11"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.80 to 2.10"
      },
      {
        "model": "seil/turbo",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.80 to 2.10"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 3.11"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 3.11"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 1.61"
      },
      {
        "model": "turbo",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.11"
      },
      {
        "model": "seil/x2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/b1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "neu 2fe plus",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.11"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "BID",
        "id": "46598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fb1_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fneu_2fe_plus_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fturbo_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx1_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx86_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor",
    "sources": [
      {
        "db": "BID",
        "id": "46598"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2011-0454",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "id": "CVE-2011-0454",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Adjacent Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Complete",
            "baseScore": 8.3,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2011-000014",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 8.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 6.5,
            "id": "VHN-48399",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:A/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2011-0454",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2011-000014",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201103-009",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-48399",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet. SEIL Series routers contain a buffer overflow vulnerability. Accoding to the developer, all versions of SEIL/86, SEIL/B1, SEIL/X1, SEIL/X2 3.00 through 3.11 process PPPoE packets in a non-administrative mode of operation, therefore the affect of this vulnerability is limited to the PPPAC service being stopped. A security vulnerability exists in the SEIL router that allows malicious users to compromise the target system. Sending a specially crafted message can execute arbitrary code in the context of the application. Multiple SEIL products, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow  vulnerability. Failed exploit attempts will result in a denial-of-service condition. SEIL Router is a router produced by Japanese SEIL manufacturer. ----------------------------------------------------------------------\n\n\nMeet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March). \n\nhttp://secunia.com/company/events/mms_2011/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers PPP Access Concentrator Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA43494\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/43494/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43494\n\nRELEASE DATE:\n2011-03-18\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/43494/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/43494/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43494\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in SEIL Routers, which can be\nexploited by malicious people to compromise a vulnerable system. \n\nThe vulnerability is reported in the following products:\n* SEIL/x86 firmware 1.00 to 1.61. \n* SEIL/B1 firmware 1.00 to 3.11. \n* SEIL/X1 firmware 1.00 to 3.11. \n* SEIL/X2 firmware 1.00 to 3.11. \n* SEIL/Turbo firmware 1.80 to 2.10. \n\nSOLUTION:\nUpdate to a patched version. \n\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.seil.jp/support/security/a01001.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "BID",
        "id": "46598"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "db": "PACKETSTORM",
        "id": "99440"
      }
    ],
    "trust": 2.61
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "JVN",
        "id": "JVN88991166",
        "trust": 3.4
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454",
        "trust": 3.4
      },
      {
        "db": "SECUNIA",
        "id": "43494",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014",
        "trust": 2.5
      },
      {
        "db": "BID",
        "id": "46598",
        "trust": 2.2
      },
      {
        "db": "XF",
        "id": "65672",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817",
        "trust": 0.6
      },
      {
        "db": "JVN",
        "id": "JVN#88991166",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-48399",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "99440",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "db": "BID",
        "id": "46598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "PACKETSTORM",
        "id": "99440"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      }
    ]
  },
  "id": "VAR-201103-0115",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      }
    ],
    "trust": 1.19500407
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      }
    ]
  },
  "last_update_date": "2025-04-11T23:07:34.698000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "a01001(Japanese)",
        "trust": 0.8,
        "url": "http://www.seil.jp/support/security/a01001.html"
      },
      {
        "title": "Patch for SEIL Multiple Products PPP Access Concentrator (PPPAC) Buffer Overflow Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/3112"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/43494"
      },
      {
        "trust": 1.9,
        "url": "http://www.securityfocus.com/bid/46598"
      },
      {
        "trust": 1.8,
        "url": "http://www.seil.jp/support/security/a01001.html"
      },
      {
        "trust": 1.7,
        "url": "http://jvn.jp/en/jp/jvn88991166/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/jvndb/jvndb-2011-000014"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0454"
      },
      {
        "trust": 0.8,
        "url": "http://www.ipa.go.jp/security/english/vuln/201102_seil_en.html"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/65672"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/en/jp/jvn88991166"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0454"
      },
      {
        "trust": 0.6,
        "url": "http://jvn.jp/jp/jvn88991166/index.htmlhttp"
      },
      {
        "trust": 0.3,
        "url": "http://jvn.jp/jp/jvn88991166/index.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/download/firmware/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/products/corporate/evm/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/company/events/mms_2011/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/43494/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43494"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/43494/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "db": "BID",
        "id": "46598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "PACKETSTORM",
        "id": "99440"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "db": "BID",
        "id": "46598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "db": "PACKETSTORM",
        "id": "99440"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-0454"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-03-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "date": "2011-03-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "date": "2011-02-28T00:00:00",
        "db": "BID",
        "id": "46598"
      },
      {
        "date": "2011-02-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "date": "2011-03-18T07:48:13",
        "db": "PACKETSTORM",
        "id": "99440"
      },
      {
        "date": "2011-03-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      },
      {
        "date": "2011-03-01T23:00:02.800000",
        "db": "NVD",
        "id": "CVE-2011-0454"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-03-01T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "date": "2017-08-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-48399"
      },
      {
        "date": "2011-02-28T00:00:00",
        "db": "BID",
        "id": "46598"
      },
      {
        "date": "2011-02-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-000014"
      },
      {
        "date": "2011-03-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      },
      {
        "date": "2025-04-11T00:51:21.963000",
        "db": "NVD",
        "id": "CVE-2011-0454"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "specific network environment",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL Multiple Products PPP Access Concentrator (PPPAC) Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-0817"
      },
      {
        "db": "BID",
        "id": "46598"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201103-009"
      }
    ],
    "trust": 0.6
  }
}

VAR-201310-0458

Vulnerability from variot - Updated: 2025-04-11 23:07

The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic. SEIL Series routers contain a vulnerability in RADIUS authentication. SEIL/Turbo and SEIL/neu 2FE Plus routers are router devices developed by SEIL. Multiple SEIL products are prone to a security weakness. Attackers can leverage this issue to bypass certain security restrictions. This may aid in further attacks. The following products are vulnerable: SEIL/x86 1.00 through 2.81 SEIL/X1 1.00 through 4.31 SEIL/X2 1.00 through 4.31 SEIL/B1 1.00 through 4.31 SEIL/Turbo 2.05 through 2.15 SEIL/neu 2FE Plus 2.05 through 2.15. SEIL/x86, etc. SEIL/x86 due to the fact that the program generates predictable random numbers. SEIL/x86 Versions 1.00 to 2.80, SEIL/X1 Versions 1.00 to 4.30, SEIL/X2 Versions 1.00 to 4.30, SEIL/B1 Versions 1.00 to 4.30, SEIL/Turbo Versions 1.80 to 2.15, and SEIL/neu 2FE Plus versions 1.80 to 2.15

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0458",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.15"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fb1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.80"
      },
      {
        "model": "seil\\%2fturbo",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.05"
      },
      {
        "model": "seil\\%2fx86",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.80"
      },
      {
        "model": "seil\\%2fneu 2fe plus",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.15"
      },
      {
        "model": "seil\\/neu 2fe plus",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil\\/turbo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\%2fx2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\%2fx2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "4.30"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x86",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.80"
      },
      {
        "model": "seil/turbo",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "seil",
        "version": "1.80"
      },
      {
        "model": "seil/b1",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.30"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.80 to 2.15"
      },
      {
        "model": "seil/turbo",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/turbo",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.80 to 2.15"
      },
      {
        "model": "seil/x1",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.30"
      },
      {
        "model": "seil/x2",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 4.30"
      },
      {
        "model": "seil/x86",
        "scope": null,
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": null
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 2.80"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.60"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.30"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x86",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.81"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.30"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.16"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.61"
      },
      {
        "model": "seil/turbo",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.15"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.35"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/b1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.30"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/turbo",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.16"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "4.31"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.80"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/neu 2fe plus",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.15"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "3.75"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "BID",
        "id": "62612"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fb1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fb1_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fneu_2fe_plus",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fneu_2fe_plus_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fturbo",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fturbo_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx1_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx2",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx2_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx86",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:iij:seil%252fx86_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "62612"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-4708",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "id": "CVE-2013-4708",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 4.0,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "JVNDB-2013-000091",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 6.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CNVD-2013-13386",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 4.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 4.9,
            "id": "VHN-64710",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:H/AU:N/C:P/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-4708",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2013-000091",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2013-13386",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201309-504",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-64710",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic. SEIL Series routers contain a vulnerability in RADIUS authentication. SEIL/Turbo and SEIL/neu 2FE Plus routers are router devices developed by SEIL. Multiple SEIL products are prone to a security weakness. \nAttackers can leverage this issue to bypass certain security restrictions. This may aid in further attacks. \nThe following products are vulnerable:\nSEIL/x86 1.00 through 2.81\nSEIL/X1 1.00 through 4.31\nSEIL/X2 1.00 through 4.31\nSEIL/B1 1.00 through 4.31\nSEIL/Turbo 2.05 through 2.15\nSEIL/neu 2FE Plus 2.05 through 2.15. SEIL/x86, etc. SEIL/x86 due to the fact that the program generates predictable random numbers. SEIL/x86 Versions 1.00 to 2.80, SEIL/X1 Versions 1.00 to 4.30, SEIL/X2 Versions 1.00 to 4.30, SEIL/B1 Versions 1.00 to 4.30, SEIL/Turbo Versions 1.80 to 2.15, and SEIL/neu 2FE Plus versions 1.80 to 2.15",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "BID",
        "id": "62612"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-4708",
        "trust": 3.4
      },
      {
        "db": "JVN",
        "id": "JVN40079308",
        "trust": 2.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091",
        "trust": 2.5
      },
      {
        "db": "OSVDB",
        "id": "97619",
        "trust": 1.7
      },
      {
        "db": "BID",
        "id": "62612",
        "trust": 1.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504",
        "trust": 0.7
      },
      {
        "db": "SECUNIA",
        "id": "54818",
        "trust": 0.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386",
        "trust": 0.6
      },
      {
        "db": "JVN",
        "id": "JVN#40079308",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "db": "BID",
        "id": "62612"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      }
    ]
  },
  "id": "VAR-201310-0458",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      }
    ],
    "trust": 1.240005232857143
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      }
    ]
  },
  "last_update_date": "2025-04-11T23:07:15.743000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Internet Initiative Japan Inc. website",
        "trust": 0.8,
        "url": "http://www.seil.jp/support/security/a01388.html"
      },
      {
        "title": "SEIL Multiple Products RADIUS Verification Random Number Generation Vulnerability Patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/39884"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-310",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://www.seil.jp/support/security/a01388.html"
      },
      {
        "trust": 1.7,
        "url": "http://jvn.jp/en/jp/jvn40079308/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/ja/contents/2013/jvndb-2013-000091.html"
      },
      {
        "trust": 1.7,
        "url": "http://osvdb.org/97619"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4708"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/en/jp/jvn40079308/"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-4708"
      },
      {
        "trust": 0.6,
        "url": "http://www.secunia.com/advisories/54818/"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/62612"
      },
      {
        "trust": 0.3,
        "url": "http://jvn.jp/jp/jvn40079308/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "db": "BID",
        "id": "62612"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "db": "BID",
        "id": "62612"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-4708"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-09-29T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "date": "2013-10-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "BID",
        "id": "62612"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "date": "2013-09-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      },
      {
        "date": "2013-10-01T17:55:03.647000",
        "db": "NVD",
        "id": "CVE-2013-4708"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-09-29T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2013-13386"
      },
      {
        "date": "2013-10-07T00:00:00",
        "db": "VULHUB",
        "id": "VHN-64710"
      },
      {
        "date": "2013-09-20T00:00:00",
        "db": "BID",
        "id": "62612"
      },
      {
        "date": "2013-10-08T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      },
      {
        "date": "2014-06-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      },
      {
        "date": "2025-04-11T00:51:21.963000",
        "db": "NVD",
        "id": "CVE-2013-4708"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL Series routers vulnerable in RADIUS authentication",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2013-000091"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "encryption problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201309-504"
      }
    ],
    "trust": 0.6
  }
}

VAR-201008-0257

Vulnerability from variot - Updated: 2025-04-11 23:03

The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address. SEIL/X Series and SEIL/B1 are routers. Only IPv6 Unicast RPF in strict mode is vulnerable. According to the developer, IPv6 Unicast RPF in loose mode and IPv4 Unicast RPF are not affected by this vulnerability.Packets that should be discarded, such as when an IP address is spoofed, may be transferred without being discarded. Seil/x2 Firmware is prone to a security bypass vulnerability. ----------------------------------------------------------------------

Secunia receives 'Frost & Sullivan's Global 2010 Customer Value Enhancement Award

Secunia outshines its competitors and receives the Frost & Sullivan’s Global 2010 Customer Value Enhancement Award. Based on its recent analysis of the vulnerability research market, Frost & Sullivan concluded:

"Secunia provides tremendous value for their customers, end-users, and to other security vendors."

Read more: http://secunia.com/blog/117/


TITLE: SEIL Routers IPv6 Unicast RPF Spoofing Vulnerability

SECUNIA ADVISORY ID: SA41088

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/41088/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=41088

RELEASE DATE: 2010-08-26

DISCUSS ADVISORY: http://secunia.com/advisories/41088/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/41088/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=41088

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: A vulnerability has been reported in SEIL routers, which can be exploited by malicious people to conduct spoofing attacks.

The vulnerability is reported in the following products: * SEIL/X1 firmware version 1.00 through 2.73 * SEIL/X2 firmware version 1.00 through 2.73 * SEIL/B1 firmware version 1.00 through 2.73

SOLUTION: Upgrade to firmware version 2.74.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: SEIL: http://www.seil.jp/seilseries/security/2010/a00875.php

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201008-0257",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.10"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.11"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.20"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.73"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.30"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.31"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.41"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.32"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.43"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.44"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.30"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.22"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.43"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.44"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.21"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.40"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.11"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.22"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.21"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.40"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.31"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.41"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.20"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.10"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "1.32"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.01"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "firmware 1.00 to 2.73"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "firmware 1.00 to 2.73"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "firmware 1.00 to 2.73"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.44"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.43"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.41"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.40"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.32"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.31"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.30"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.22"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.21"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.20"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.11"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.10"
      },
      {
        "model": "seil%2fx2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.73"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.44"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.43"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.41"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.40"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.32"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.31"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.30"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.22"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.21"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.20"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.11"
      },
      {
        "model": "seil%2fx1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.10"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.72"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.70"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.63"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.62"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.61"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.60"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "2.01"
      },
      {
        "model": "seil%2fb1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "iij",
        "version": "1.00"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "78900"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-364"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-2363"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fb1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx2",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unknown",
    "sources": [
      {
        "db": "BID",
        "id": "78900"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2010-2363",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2010-2363",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.1,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 4.3,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2010-000032",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-44968",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2010-2363",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2010-000032",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201008-364",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-44968",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2010-2363",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-44968"
      },
      {
        "db": "VULMON",
        "id": "CVE-2010-2363"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-364"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-2363"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address. SEIL/X Series and SEIL/B1 are routers. Only IPv6 Unicast RPF in strict mode is vulnerable. According to the developer, IPv6 Unicast RPF in loose mode and IPv4 Unicast RPF are not affected by this vulnerability.Packets that should be discarded, such as when an IP address is spoofed, may be transferred without being discarded. Seil/x2 Firmware is prone to a security bypass vulnerability. ----------------------------------------------------------------------\n\n\nSecunia receives \u0027Frost \u0026 Sullivan\u0027s Global 2010 Customer Value Enhancement Award\n\nSecunia outshines its competitors and receives the Frost \u0026 Sullivan\u2019s Global 2010 Customer Value Enhancement Award. Based on its recent analysis of the vulnerability research market, Frost \u0026 Sullivan concluded:\n\n\"Secunia provides tremendous value for their customers, end-users, and to other security vendors.\"\n\nRead more: http://secunia.com/blog/117/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers IPv6 Unicast RPF Spoofing Vulnerability\n\nSECUNIA ADVISORY ID:\nSA41088\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/41088/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41088\n\nRELEASE DATE:\n2010-08-26\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/41088/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/41088/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41088\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in SEIL routers, which can be\nexploited by malicious people to conduct spoofing attacks. \n\nThe vulnerability is reported in the following products:\n* SEIL/X1 firmware version 1.00 through 2.73\n* SEIL/X2 firmware version 1.00 through 2.73\n* SEIL/B1 firmware version 1.00 through 2.73\n\nSOLUTION:\nUpgrade to firmware version 2.74. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nSEIL:\nhttp://www.seil.jp/seilseries/security/2010/a00875.php\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2010-2363"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      },
      {
        "db": "BID",
        "id": "78900"
      },
      {
        "db": "VULHUB",
        "id": "VHN-44968"
      },
      {
        "db": "VULMON",
        "id": "CVE-2010-2363"
      },
      {
        "db": "PACKETSTORM",
        "id": "93040"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2010-2363",
        "trust": 2.9
      },
      {
        "db": "JVN",
        "id": "JVN12683004",
        "trust": 2.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032",
        "trust": 2.6
      },
      {
        "db": "SECUNIA",
        "id": "41088",
        "trust": 1.3
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-364",
        "trust": 0.7
      },
      {
        "db": "JVN",
        "id": "JVN#12683004",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "78900",
        "trust": 0.5
      },
      {
        "db": "XF",
        "id": "61382",
        "trust": 0.3
      },
      {
        "db": "VULHUB",
        "id": "VHN-44968",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2010-2363",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "93040",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-44968"
      },
      {
        "db": "VULMON",
        "id": "CVE-2010-2363"
      },
      {
        "db": "BID",
        "id": "78900"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      },
      {
        "db": "PACKETSTORM",
        "id": "93040"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-364"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-2363"
      }
    ]
  },
  "id": "VAR-201008-0257",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-44968"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-11T23:03:18.973000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "a00875",
        "trust": 0.8,
        "url": "http://www.seil.jp/seilseries/security/2010/a00875.php"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-264",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-44968"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-2363"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "http://jvn.jp/en/jp/jvn12683004/index.html"
      },
      {
        "trust": 2.2,
        "url": "http://www.seil.jp/seilseries/security/2010/a00875.php"
      },
      {
        "trust": 1.8,
        "url": "http://jvndb.jvn.jp/en/contents/2010/jvndb-2010-000032.html"
      },
      {
        "trust": 1.2,
        "url": "http://secunia.com/advisories/41088"
      },
      {
        "trust": 1.2,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61382"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2363"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2363"
      },
      {
        "trust": 0.3,
        "url": "http://xforce.iss.net/xforce/xfdb/61382"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/264.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.securityfocus.com/bid/78900"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/41088/"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41088"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/products/corporate/evm/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/41088/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/blog/117/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-44968"
      },
      {
        "db": "VULMON",
        "id": "CVE-2010-2363"
      },
      {
        "db": "BID",
        "id": "78900"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      },
      {
        "db": "PACKETSTORM",
        "id": "93040"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-364"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-2363"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-44968"
      },
      {
        "db": "VULMON",
        "id": "CVE-2010-2363"
      },
      {
        "db": "BID",
        "id": "78900"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      },
      {
        "db": "PACKETSTORM",
        "id": "93040"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-364"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-2363"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2010-08-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-44968"
      },
      {
        "date": "2010-08-30T00:00:00",
        "db": "VULMON",
        "id": "CVE-2010-2363"
      },
      {
        "date": "2010-08-30T00:00:00",
        "db": "BID",
        "id": "78900"
      },
      {
        "date": "2010-08-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      },
      {
        "date": "2010-08-25T05:39:54",
        "db": "PACKETSTORM",
        "id": "93040"
      },
      {
        "date": "2010-08-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201008-364"
      },
      {
        "date": "2010-08-30T20:00:01.983000",
        "db": "NVD",
        "id": "CVE-2010-2363"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-44968"
      },
      {
        "date": "2017-08-17T00:00:00",
        "db": "VULMON",
        "id": "CVE-2010-2363"
      },
      {
        "date": "2010-08-30T00:00:00",
        "db": "BID",
        "id": "78900"
      },
      {
        "date": "2010-08-25T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      },
      {
        "date": "2010-09-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201008-364"
      },
      {
        "date": "2025-04-11T00:51:21.963000",
        "db": "NVD",
        "id": "CVE-2010-2363"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-364"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL/X Series and SEIL/B1 IPv6 Unicast RPF vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-000032"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "permissions and access control",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-364"
      }
    ],
    "trust": 0.6
  }
}

VAR-200912-0285

Vulnerability from variot - Updated: 2025-04-10 23:13

The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack. As a result, the third party may gain access to the network. According the developer, when L2TP/IPsec is being used, the authentication challenges are protected by the encryption provided by IPsec, and therefore the probability of being affected by this issue are reduced. SEIL/B1 is prone to an authentication-bypass vulnerability affecting CHAP and MS-CHAP-V2 authentication. Versions prior to SEIL/B1 2.60 are vulnerable. ----------------------------------------------------------------------

Do you have VARM strategy implemented?

(Vulnerability Assessment Remediation Management)

If not, then implement it through the most reliable vulnerability intelligence source on the market.

Implement it through Secunia.

For more information visit: http://secunia.com/advisories/business_solutions/

Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com


TITLE: SEIL Routers PPP Access Concentrator Replay Vulnerability

SECUNIA ADVISORY ID: SA37628

VERIFY ADVISORY: http://secunia.com/advisories/37628/

DESCRIPTION: A vulnerability has been reported in the SEIL B1 router, which can be exploited by malicious people to bypass certain security restrictions.

SOLUTION: Update to version 2.60.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: SEIL: http://www.seil.jp/seilseries/security/2009/a00697.php

JVN: http://jvn.jp/en/jp/JVN49602378/index.html http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000079.html


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200912-0285",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "1.00"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.20"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.52"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.01"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.10"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "firmware 1.00 through 2.52"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/b1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.60"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "37293"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000079"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-340"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4409"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fb1",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000079"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor",
    "sources": [
      {
        "db": "BID",
        "id": "37293"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-340"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2009-4409",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 4.9,
            "id": "CVE-2009-4409",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 1.0,
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "High",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 2.6,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2009-000079",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2009-4409",
            "trust": 1.0,
            "value": "LOW"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2009-000079",
            "trust": 0.8,
            "value": "Low"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200912-340",
            "trust": 0.6,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000079"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-340"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4409"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack. As a result, the third party may gain access to the network. According the developer, when L2TP/IPsec is being used, the authentication challenges are protected by the encryption provided by IPsec, and therefore the probability of being affected by this issue are reduced. SEIL/B1 is prone to an authentication-bypass vulnerability affecting CHAP and MS-CHAP-V2 authentication. \nVersions prior to SEIL/B1 2.60 are vulnerable. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management)  \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers PPP Access Concentrator Replay Vulnerability\n\nSECUNIA ADVISORY ID:\nSA37628\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/37628/\n\nDESCRIPTION:\nA vulnerability has been reported in the SEIL B1 router, which can be\nexploited by malicious people to bypass certain security\nrestrictions. \n\nSOLUTION:\nUpdate to version 2.60. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nSEIL:\nhttp://www.seil.jp/seilseries/security/2009/a00697.php\n\nJVN:\nhttp://jvn.jp/en/jp/JVN49602378/index.html\nhttp://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000079.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-4409"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000079"
      },
      {
        "db": "BID",
        "id": "37293"
      },
      {
        "db": "PACKETSTORM",
        "id": "83650"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "JVN",
        "id": "JVN49602378",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "37293",
        "trust": 2.7
      },
      {
        "db": "SECUNIA",
        "id": "37628",
        "trust": 2.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000079",
        "trust": 2.5
      },
      {
        "db": "OSVDB",
        "id": "61118",
        "trust": 2.4
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4409",
        "trust": 2.4
      },
      {
        "db": "JVN",
        "id": "JVN#49602378",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-340",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "83650",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "37293"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000079"
      },
      {
        "db": "PACKETSTORM",
        "id": "83650"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-340"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4409"
      }
    ]
  },
  "id": "VAR-200912-0285",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.46153846
  },
  "last_update_date": "2025-04-10T23:13:54.768000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "a00697.php",
        "trust": 0.8,
        "url": "http://www.seil.jp/seilseries/security/2009/a00697.php"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000079"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-287",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000079"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4409"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://jvn.jp/en/jp/jvn49602378/index.html"
      },
      {
        "trust": 2.4,
        "url": "http://www.osvdb.org/61118"
      },
      {
        "trust": 2.4,
        "url": "http://secunia.com/advisories/37628"
      },
      {
        "trust": 2.4,
        "url": "http://www.securityfocus.com/bid/37293"
      },
      {
        "trust": 2.0,
        "url": "http://www.seil.jp/seilseries/security/2009/a00697.php"
      },
      {
        "trust": 1.6,
        "url": "http://jvndb.jvn.jp/ja/contents/2009/jvndb-2009-000079.html"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4409"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-4409"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/business_solutions/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://jvndb.jvn.jp/en/contents/2009/jvndb-2009-000079.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/37628/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "37293"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000079"
      },
      {
        "db": "PACKETSTORM",
        "id": "83650"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-340"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4409"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "37293"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000079"
      },
      {
        "db": "PACKETSTORM",
        "id": "83650"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-340"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4409"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-12-11T00:00:00",
        "db": "BID",
        "id": "37293"
      },
      {
        "date": "2009-12-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-000079"
      },
      {
        "date": "2009-12-10T08:24:04",
        "db": "PACKETSTORM",
        "id": "83650"
      },
      {
        "date": "2009-12-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200912-340"
      },
      {
        "date": "2009-12-23T21:30:00.313000",
        "db": "NVD",
        "id": "CVE-2009-4409"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-12-14T19:23:00",
        "db": "BID",
        "id": "37293"
      },
      {
        "date": "2009-12-09T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-000079"
      },
      {
        "date": "2009-12-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200912-340"
      },
      {
        "date": "2025-04-09T00:30:58.490000",
        "db": "NVD",
        "id": "CVE-2009-4409"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-340"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL/B1 authentication issue",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000079"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "authorization issue",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-340"
      }
    ],
    "trust": 0.6
  }
}

VAR-200912-0195

Vulnerability from variot - Updated: 2025-04-10 23:05

Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets. SEIL/X Series and SEIL/B1 contain a denial of service (DoS) vulnerability. SEIL/X Series and SEIL/B1 are routers. Successfully exploiting these issues allows remote attackers to execute arbitrary code with administrative privileges or crash the affected device, denying service to legitimate users. The following devices are affected: SEIL/X1 2.40 to 2.51 SEIL/X2 2.40 to 2.51 SEIL/B1 2.40 to 2.51. ----------------------------------------------------------------------

Do you have VARM strategy implemented?

(Vulnerability Assessment Remediation Management)

If not, then implement it through the most reliable vulnerability intelligence source on the market.

Implement it through Secunia.

For more information visit: http://secunia.com/advisories/business_solutions/

Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com


TITLE: SEIL Routers Denial of Service and Buffer Overflow Vulnerabilities

SECUNIA ADVISORY ID: SA37154

VERIFY ADVISORY: http://secunia.com/advisories/37154/

DESCRIPTION: Some vulnerabilities have been reported in the SEIL/X1, X2, and B1 routers, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

1) An error exists when processing of certain GRE packets.

Note: Successful exploitation requires that the NAT functionality is enabled.

2) A buffer overflow error exists within the URL filtering functionality. This can be exploited to cause a buffer overflow and potentially execute arbitrary code by tricking a user into visiting a specially crafted website.

Vulnerability #1 is reported in SEIL/X1, X2, and B1 version 2.30 to 2.51 and vulnerability #2 is reported in SEIL/X1, X2, and B1 version 2.40 to 2.51.

SOLUTION: Update to version 2.52.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: 1) http://jvn.jp/jp/JVN13011682/index.html http://www.seil.jp/seilseries/security/2009/a00674.php

2) http://jvn.jp/jp/JVN06362164/index.html http://www.seil.jp/seilseries/security/2009/a00669.php


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200912-0195",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.30"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "firmware 2.30 to 2.51"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "firmware 2.30 to 2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "firmware 2.30 to 2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/b1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "36896"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-157"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4293"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fb1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx2",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "JPCERT/CC",
    "sources": [
      {
        "db": "BID",
        "id": "36896"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2009-4293",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2009-4293",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Complete",
            "baseScore": 7.8,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2009-000070",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.1,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-41739",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2009-4293",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2009-000070",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200912-157",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-41739",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41739"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-157"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4293"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets. SEIL/X Series and SEIL/B1 contain a denial of service (DoS) vulnerability. SEIL/X Series and SEIL/B1 are routers. \nSuccessfully exploiting these issues allows remote attackers to execute arbitrary code with administrative privileges or crash the affected device, denying service to legitimate users. \nThe following devices are affected:\nSEIL/X1 2.40 to 2.51\nSEIL/X2 2.40 to 2.51\nSEIL/B1 2.40 to 2.51. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management)  \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers Denial of Service and Buffer Overflow Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA37154\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/37154/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in the SEIL/X1, X2, and B1\nrouters, which can be exploited by malicious people to cause a DoS\n(Denial of Service) and compromise a vulnerable system. \n\n1) An error exists when processing of certain GRE packets. \n\nNote: Successful exploitation requires that the NAT functionality is\nenabled. \n\n2) A buffer overflow error exists within the URL filtering\nfunctionality. This can be exploited to cause a buffer overflow and\npotentially execute arbitrary code by tricking a user into visiting a\nspecially crafted website. \n\nVulnerability #1 is reported in SEIL/X1, X2, and B1 version 2.30 to\n2.51 and vulnerability #2 is reported in SEIL/X1, X2, and B1 version\n2.40 to 2.51. \n\nSOLUTION:\nUpdate to version 2.52. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\n1) http://jvn.jp/jp/JVN13011682/index.html\nhttp://www.seil.jp/seilseries/security/2009/a00674.php\n\n2) http://jvn.jp/jp/JVN06362164/index.html\nhttp://www.seil.jp/seilseries/security/2009/a00669.php\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-4293"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      },
      {
        "db": "BID",
        "id": "36896"
      },
      {
        "db": "VULHUB",
        "id": "VHN-41739"
      },
      {
        "db": "PACKETSTORM",
        "id": "82299"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "JVN",
        "id": "JVN13011682",
        "trust": 2.9
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4293",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "37154",
        "trust": 2.7
      },
      {
        "db": "OSVDB",
        "id": "59361",
        "trust": 2.5
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-3111",
        "trust": 2.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070",
        "trust": 2.5
      },
      {
        "db": "XF",
        "id": "54050",
        "trust": 1.4
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-157",
        "trust": 0.7
      },
      {
        "db": "JVN",
        "id": "JVN#13011682",
        "trust": 0.6
      },
      {
        "db": "JVN",
        "id": "JVN06362164",
        "trust": 0.4
      },
      {
        "db": "BID",
        "id": "36896",
        "trust": 0.3
      },
      {
        "db": "VULHUB",
        "id": "VHN-41739",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "82299",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41739"
      },
      {
        "db": "BID",
        "id": "36896"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      },
      {
        "db": "PACKETSTORM",
        "id": "82299"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-157"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4293"
      }
    ]
  },
  "id": "VAR-200912-0195",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41739"
      }
    ],
    "trust": 0.5871794866666666
  },
  "last_update_date": "2025-04-10T23:05:00.224000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "a00674.php",
        "trust": 0.8,
        "url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-16",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-20",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41739"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4293"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://jvn.jp/en/jp/jvn13011682/index.html"
      },
      {
        "trust": 2.5,
        "url": "http://osvdb.org/59361"
      },
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/37154"
      },
      {
        "trust": 2.5,
        "url": "http://www.vupen.com/english/advisories/2009/3111"
      },
      {
        "trust": 2.1,
        "url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/en/contents/2009/jvndb-2009-000070.html"
      },
      {
        "trust": 1.4,
        "url": "http://xforce.iss.net/xforce/xfdb/54050"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4293"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-4293"
      },
      {
        "trust": 0.4,
        "url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
      },
      {
        "trust": 0.3,
        "url": "http://jvn.jp/en/jp/jvn06362164/index.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/"
      },
      {
        "trust": 0.1,
        "url": "http://jvn.jp/jp/jvn13011682/index.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://jvn.jp/jp/jvn06362164/index.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/business_solutions/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/37154/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41739"
      },
      {
        "db": "BID",
        "id": "36896"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      },
      {
        "db": "PACKETSTORM",
        "id": "82299"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-157"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4293"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-41739"
      },
      {
        "db": "BID",
        "id": "36896"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      },
      {
        "db": "PACKETSTORM",
        "id": "82299"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-157"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4293"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-12-10T00:00:00",
        "db": "VULHUB",
        "id": "VHN-41739"
      },
      {
        "date": "2009-11-02T00:00:00",
        "db": "BID",
        "id": "36896"
      },
      {
        "date": "2009-11-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      },
      {
        "date": "2009-10-28T10:48:16",
        "db": "PACKETSTORM",
        "id": "82299"
      },
      {
        "date": "2009-12-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200912-157"
      },
      {
        "date": "2009-12-10T23:30:00.420000",
        "db": "NVD",
        "id": "CVE-2009-4293"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-41739"
      },
      {
        "date": "2010-08-11T11:34:00",
        "db": "BID",
        "id": "36896"
      },
      {
        "date": "2009-11-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      },
      {
        "date": "2009-12-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200912-157"
      },
      {
        "date": "2025-04-09T00:30:58.490000",
        "db": "NVD",
        "id": "CVE-2009-4293"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-157"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL/X Series and SEIL/B1 denial of service vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000070"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "configuration error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-157"
      }
    ],
    "trust": 0.6
  }
}

VAR-200912-0194

Vulnerability from variot - Updated: 2025-04-10 23:05

Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors. SEIL/X Series and SEIL/B1 contain a buffer overflow vulnerability. SEIL/X Series and SEIL/B1 are routers. The following devices are affected: SEIL/X1 2.40 to 2.51 SEIL/X2 2.40 to 2.51 SEIL/B1 2.40 to 2.51. ----------------------------------------------------------------------

Do you have VARM strategy implemented?

(Vulnerability Assessment Remediation Management)

If not, then implement it through the most reliable vulnerability intelligence source on the market.

Implement it through Secunia.

For more information visit: http://secunia.com/advisories/business_solutions/

Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com


TITLE: SEIL Routers Denial of Service and Buffer Overflow Vulnerabilities

SECUNIA ADVISORY ID: SA37154

VERIFY ADVISORY: http://secunia.com/advisories/37154/

DESCRIPTION: Some vulnerabilities have been reported in the SEIL/X1, X2, and B1 routers, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

1) An error exists when processing of certain GRE packets. This can be exploited to cause the device to restart by sending certain specially crafted GRE packets.

Note: Successful exploitation requires that the NAT functionality is enabled.

2) A buffer overflow error exists within the URL filtering functionality.

Vulnerability #1 is reported in SEIL/X1, X2, and B1 version 2.30 to 2.51 and vulnerability #2 is reported in SEIL/X1, X2, and B1 version 2.40 to 2.51.

SOLUTION: Update to version 2.52.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: 1) http://jvn.jp/jp/JVN13011682/index.html http://www.seil.jp/seilseries/security/2009/a00674.php

2) http://jvn.jp/jp/JVN06362164/index.html http://www.seil.jp/seilseries/security/2009/a00669.php


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200912-0194",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.51"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.42"
      },
      {
        "model": "seil\\/x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.50"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/b1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "*"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.40"
      },
      {
        "model": "seil\\/x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iij",
        "version": "2.41"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "firmware 2.40 to 2.51"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "firmware 2.40 to 2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "firmware 2.40 to 2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.49"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.47"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.46"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.45"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.44"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.43"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.48"
      },
      {
        "model": "seil/x2",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/x1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "seil/b1",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "seil",
        "version": "2.52"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "36896"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-156"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4292"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fb1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx1",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iij:seil%2Fx2",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "JPCERT/CC",
    "sources": [
      {
        "db": "BID",
        "id": "36896"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2009-4292",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "CVE-2009-4292",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.0,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Complete",
            "baseScore": 9.3,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "JVNDB-2009-000069",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 9.3,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 8.6,
            "id": "VHN-41738",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2009-4292",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2009-000069",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200912-156",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-41738",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41738"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-156"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4292"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors. SEIL/X Series and SEIL/B1 contain a buffer overflow vulnerability. SEIL/X Series and SEIL/B1 are routers. \nThe following devices are affected:\nSEIL/X1 2.40 to 2.51\nSEIL/X2 2.40 to 2.51\nSEIL/B1 2.40 to 2.51. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management)  \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers Denial of Service and Buffer Overflow Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA37154\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/37154/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in the SEIL/X1, X2, and B1\nrouters, which can be exploited by malicious people to cause a DoS\n(Denial of Service) and compromise a vulnerable system. \n\n1) An error exists when processing of certain GRE packets. This can\nbe exploited to cause the device to restart by sending certain\nspecially crafted GRE packets. \n\nNote: Successful exploitation requires that the NAT functionality is\nenabled. \n\n2) A buffer overflow error exists within the URL filtering\nfunctionality. \n\nVulnerability #1 is reported in SEIL/X1, X2, and B1 version 2.30 to\n2.51 and vulnerability #2 is reported in SEIL/X1, X2, and B1 version\n2.40 to 2.51. \n\nSOLUTION:\nUpdate to version 2.52. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\n1) http://jvn.jp/jp/JVN13011682/index.html\nhttp://www.seil.jp/seilseries/security/2009/a00674.php\n\n2) http://jvn.jp/jp/JVN06362164/index.html\nhttp://www.seil.jp/seilseries/security/2009/a00669.php\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-4292"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      },
      {
        "db": "BID",
        "id": "36896"
      },
      {
        "db": "VULHUB",
        "id": "VHN-41738"
      },
      {
        "db": "PACKETSTORM",
        "id": "82299"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "JVN",
        "id": "JVN06362164",
        "trust": 2.9
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4292",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "37154",
        "trust": 2.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2009-3111",
        "trust": 2.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069",
        "trust": 2.5
      },
      {
        "db": "OSVDB",
        "id": "59362",
        "trust": 1.7
      },
      {
        "db": "XF",
        "id": "54050",
        "trust": 0.8
      },
      {
        "db": "OSVDB",
        "id": "59361",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-156",
        "trust": 0.7
      },
      {
        "db": "JVN",
        "id": "JVN#06362164",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "54051",
        "trust": 0.6
      },
      {
        "db": "JVN",
        "id": "JVN13011682",
        "trust": 0.4
      },
      {
        "db": "BID",
        "id": "36896",
        "trust": 0.3
      },
      {
        "db": "VULHUB",
        "id": "VHN-41738",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "82299",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41738"
      },
      {
        "db": "BID",
        "id": "36896"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      },
      {
        "db": "PACKETSTORM",
        "id": "82299"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-156"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4292"
      }
    ]
  },
  "id": "VAR-200912-0194",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41738"
      }
    ],
    "trust": 0.5871794866666666
  },
  "last_update_date": "2025-04-10T23:05:00.187000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "a00669.php",
        "trust": 0.8,
        "url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41738"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4292"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://jvn.jp/en/jp/jvn06362164/index.html"
      },
      {
        "trust": 2.5,
        "url": "http://secunia.com/advisories/37154"
      },
      {
        "trust": 2.5,
        "url": "http://www.vupen.com/english/advisories/2009/3111"
      },
      {
        "trust": 2.1,
        "url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
      },
      {
        "trust": 1.7,
        "url": "http://jvndb.jvn.jp/en/contents/2009/jvndb-2009-000069.html"
      },
      {
        "trust": 1.7,
        "url": "http://osvdb.org/59362"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4292"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/54050"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-4292"
      },
      {
        "trust": 0.8,
        "url": "http://osvdb.org/59361"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/54051"
      },
      {
        "trust": 0.4,
        "url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
      },
      {
        "trust": 0.3,
        "url": "http://jvn.jp/en/jp/jvn13011682/index.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.seil.jp/"
      },
      {
        "trust": 0.1,
        "url": "http://jvn.jp/jp/jvn13011682/index.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://jvn.jp/jp/jvn06362164/index.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/business_solutions/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/37154/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-41738"
      },
      {
        "db": "BID",
        "id": "36896"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      },
      {
        "db": "PACKETSTORM",
        "id": "82299"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-156"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4292"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-41738"
      },
      {
        "db": "BID",
        "id": "36896"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      },
      {
        "db": "PACKETSTORM",
        "id": "82299"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-156"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-4292"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-12-10T00:00:00",
        "db": "VULHUB",
        "id": "VHN-41738"
      },
      {
        "date": "2009-11-02T00:00:00",
        "db": "BID",
        "id": "36896"
      },
      {
        "date": "2009-11-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      },
      {
        "date": "2009-10-28T10:48:16",
        "db": "PACKETSTORM",
        "id": "82299"
      },
      {
        "date": "2009-12-10T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200912-156"
      },
      {
        "date": "2009-12-10T23:30:00.390000",
        "db": "NVD",
        "id": "CVE-2009-4292"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-08-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-41738"
      },
      {
        "date": "2010-08-11T11:34:00",
        "db": "BID",
        "id": "36896"
      },
      {
        "date": "2009-11-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      },
      {
        "date": "2009-12-11T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200912-156"
      },
      {
        "date": "2025-04-09T00:30:58.490000",
        "db": "NVD",
        "id": "CVE-2009-4292"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-156"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL/X Series and SEIL/B1 buffer overflow vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-000069"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200912-156"
      }
    ],
    "trust": 0.6
  }
}

CVE-2015-0887 (GCVE-0-2015-0887)

Vulnerability from nvd – Published: 2015-02-28 02:00 – Updated: 2024-08-06 04:26
VLAI?
Summary
npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.seil.jp/support/security/a01541.html x_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN63949115/index.html third-party-advisoryx_refsource_JVN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T04:26:11.341Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01541.html"
          },
          {
            "name": "JVNDB-2015-000031",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
          },
          {
            "name": "JVN#63949115",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN63949115/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-02-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-02-28T02:57:00",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01541.html"
        },
        {
          "name": "JVNDB-2015-000031",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
        },
        {
          "name": "JVN#63949115",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN63949115/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2015-0887",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.seil.jp/support/security/a01541.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01541.html"
            },
            {
              "name": "JVNDB-2015-000031",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
            },
            {
              "name": "JVN#63949115",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN63949115/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2015-0887",
    "datePublished": "2015-02-28T02:00:00",
    "dateReserved": "2015-01-08T00:00:00",
    "dateUpdated": "2024-08-06T04:26:11.341Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2004 (GCVE-0-2014-2004)

Vulnerability from nvd – Published: 2014-06-16 14:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.seil.jp/support/security/a01443.html x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN10724763/index.html third-party-advisoryx_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:58:16.188Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01443.html"
          },
          {
            "name": "JVN#10724763",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN10724763/index.html"
          },
          {
            "name": "JVNDB-2014-000055",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-06-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-06-16T14:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01443.html"
        },
        {
          "name": "JVN#10724763",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN10724763/index.html"
        },
        {
          "name": "JVNDB-2014-000055",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-2004",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.seil.jp/support/security/a01443.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01443.html"
            },
            {
              "name": "JVN#10724763",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN10724763/index.html"
            },
            {
              "name": "JVNDB-2014-000055",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-2004",
    "datePublished": "2014-06-16T14:00:00",
    "dateReserved": "2014-02-17T00:00:00",
    "dateUpdated": "2024-08-06T09:58:16.188Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4708 (GCVE-0-2013-4708)

Vulnerability from nvd – Published: 2013-10-01 17:00 – Updated: 2024-09-17 01:15
VLAI?
Summary
The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.seil.jp/support/security/a01388.html x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN40079308/index.html third-party-advisoryx_refsource_JVN
http://osvdb.org/97619 vdb-entryx_refsource_OSVDB
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-0… third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:52:27.107Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01388.html"
          },
          {
            "name": "JVN#40079308",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN40079308/index.html"
          },
          {
            "name": "97619",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/97619"
          },
          {
            "name": "JVNDB-2013-000091",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-10-01T17:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01388.html"
        },
        {
          "name": "JVN#40079308",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN40079308/index.html"
        },
        {
          "name": "97619",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/97619"
        },
        {
          "name": "JVNDB-2013-000091",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2013-4708",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.seil.jp/support/security/a01388.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01388.html"
            },
            {
              "name": "JVN#40079308",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN40079308/index.html"
            },
            {
              "name": "97619",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/97619"
            },
            {
              "name": "JVNDB-2013-000091",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2013-4708",
    "datePublished": "2013-10-01T17:00:00Z",
    "dateReserved": "2013-06-26T00:00:00Z",
    "dateUpdated": "2024-09-17T01:15:57.609Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4709 (GCVE-0-2013-4709)

Vulnerability from nvd – Published: 2013-09-20 15:00 – Updated: 2024-09-16 17:58
VLAI?
Summary
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvn.jp/en/jp/JVN43152129/index.html third-party-advisoryx_refsource_JVN
http://www.seil.jp/support/security/a01396.html x_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:52:27.122Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#43152129",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN43152129/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01396.html"
          },
          {
            "name": "JVNDB-2013-000092",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-09-20T15:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#43152129",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN43152129/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01396.html"
        },
        {
          "name": "JVNDB-2013-000092",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2013-4709",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#43152129",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN43152129/index.html"
            },
            {
              "name": "http://www.seil.jp/support/security/a01396.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01396.html"
            },
            {
              "name": "JVNDB-2013-000092",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2013-4709",
    "datePublished": "2013-09-20T15:00:00Z",
    "dateReserved": "2013-06-26T00:00:00Z",
    "dateUpdated": "2024-09-16T17:58:50.809Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0454 (GCVE-0-2011-0454)

Vulnerability from nvd – Published: 2011-03-01 22:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN88991166/index.html third-party-advisoryx_refsource_JVN
http://www.securityfocus.com/bid/46598 vdb-entryx_refsource_BID
http://www.seil.jp/support/security/a01001.html x_refsource_CONFIRM
http://secunia.com/advisories/43494 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.946Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVNDB-2011-000014",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
          },
          {
            "name": "JVN#88991166",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
          },
          {
            "name": "46598",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46598"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01001.html"
          },
          {
            "name": "43494",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43494"
          },
          {
            "name": "seil-pppac-bo(65672)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVNDB-2011-000014",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
        },
        {
          "name": "JVN#88991166",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
        },
        {
          "name": "46598",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46598"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01001.html"
        },
        {
          "name": "43494",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43494"
        },
        {
          "name": "seil-pppac-bo(65672)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2011-0454",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVNDB-2011-000014",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
            },
            {
              "name": "JVN#88991166",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
            },
            {
              "name": "46598",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46598"
            },
            {
              "name": "http://www.seil.jp/support/security/a01001.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01001.html"
            },
            {
              "name": "43494",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43494"
            },
            {
              "name": "seil-pppac-bo(65672)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2011-0454",
    "datePublished": "2011-03-01T22:00:00",
    "dateReserved": "2011-01-14T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.946Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-4409 (GCVE-0-2009-4409)

Vulnerability from nvd – Published: 2009-12-23 21:00 – Updated: 2024-09-17 01:35
VLAI?
Summary
The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/37628 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/37293 vdb-entryx_refsource_BID
http://jvn.jp/en/jp/JVN49602378/index.html third-party-advisoryx_refsource_JVN
http://www.osvdb.org/61118 vdb-entryx_refsource_OSVDB
http://www.seil.jp/seilseries/security/2009/a00697.php x_refsource_CONFIRM
http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-0… third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:01:20.198Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "37628",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37628"
          },
          {
            "name": "37293",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/37293"
          },
          {
            "name": "JVN#49602378",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN49602378/index.html"
          },
          {
            "name": "61118",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/61118"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/seilseries/security/2009/a00697.php"
          },
          {
            "name": "JVNDB-2009-000079",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000079.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-12-23T21:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "37628",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37628"
        },
        {
          "name": "37293",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/37293"
        },
        {
          "name": "JVN#49602378",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN49602378/index.html"
        },
        {
          "name": "61118",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/61118"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/seilseries/security/2009/a00697.php"
        },
        {
          "name": "JVNDB-2009-000079",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000079.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4409",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "37628",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37628"
            },
            {
              "name": "37293",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/37293"
            },
            {
              "name": "JVN#49602378",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN49602378/index.html"
            },
            {
              "name": "61118",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/61118"
            },
            {
              "name": "http://www.seil.jp/seilseries/security/2009/a00697.php",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/seilseries/security/2009/a00697.php"
            },
            {
              "name": "JVNDB-2009-000079",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000079.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4409",
    "datePublished": "2009-12-23T21:00:00Z",
    "dateReserved": "2009-12-23T00:00:00Z",
    "dateUpdated": "2024-09-17T01:35:32.632Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-4293 (GCVE-0-2009-4293)

Vulnerability from nvd – Published: 2009-12-10 23:00 – Updated: 2024-08-07 06:54
VLAI?
Summary
Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2009/3111 vdb-entryx_refsource_VUPEN
http://www.seil.jp/seilseries/security/2009/a00674.php x_refsource_CONFIRM
http://osvdb.org/59361 vdb-entryx_refsource_OSVDB
http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-0… third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN13011682/index.html third-party-advisoryx_refsource_JVN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/37154 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:54:10.459Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2009-3111",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3111"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
          },
          {
            "name": "59361",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/59361"
          },
          {
            "name": "JVNDB-2009-000070",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
          },
          {
            "name": "JVN#13011682",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN13011682/index.html"
          },
          {
            "name": "seil-gre-dos(54050)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
          },
          {
            "name": "37154",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37154"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-10-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2009-3111",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3111"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
        },
        {
          "name": "59361",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/59361"
        },
        {
          "name": "JVNDB-2009-000070",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
        },
        {
          "name": "JVN#13011682",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN13011682/index.html"
        },
        {
          "name": "seil-gre-dos(54050)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
        },
        {
          "name": "37154",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37154"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4293",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2009-3111",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3111"
            },
            {
              "name": "http://www.seil.jp/seilseries/security/2009/a00674.php",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
            },
            {
              "name": "59361",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/59361"
            },
            {
              "name": "JVNDB-2009-000070",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
            },
            {
              "name": "JVN#13011682",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN13011682/index.html"
            },
            {
              "name": "seil-gre-dos(54050)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
            },
            {
              "name": "37154",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37154"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4293",
    "datePublished": "2009-12-10T23:00:00",
    "dateReserved": "2009-12-10T00:00:00",
    "dateUpdated": "2024-08-07T06:54:10.459Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-4292 (GCVE-0-2009-4292)

Vulnerability from nvd – Published: 2009-12-10 23:00 – Updated: 2024-08-07 06:54
VLAI?
Summary
Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://jvn.jp/en/jp/JVN06362164/index.html third-party-advisoryx_refsource_JVN
http://www.vupen.com/english/advisories/2009/3111 vdb-entryx_refsource_VUPEN
http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-0… third-party-advisoryx_refsource_JVNDB
http://www.seil.jp/seilseries/security/2009/a00669.php x_refsource_CONFIRM
http://osvdb.org/59362 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/37154 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:54:10.216Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "seil-url-bo(54051)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
          },
          {
            "name": "JVN#06362164",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN06362164/index.html"
          },
          {
            "name": "ADV-2009-3111",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3111"
          },
          {
            "name": "JVNDB-2009-000069",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
          },
          {
            "name": "59362",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/59362"
          },
          {
            "name": "37154",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37154"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-10-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "seil-url-bo(54051)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
        },
        {
          "name": "JVN#06362164",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN06362164/index.html"
        },
        {
          "name": "ADV-2009-3111",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3111"
        },
        {
          "name": "JVNDB-2009-000069",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
        },
        {
          "name": "59362",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/59362"
        },
        {
          "name": "37154",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37154"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4292",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "seil-url-bo(54051)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
            },
            {
              "name": "JVN#06362164",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN06362164/index.html"
            },
            {
              "name": "ADV-2009-3111",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3111"
            },
            {
              "name": "JVNDB-2009-000069",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
            },
            {
              "name": "http://www.seil.jp/seilseries/security/2009/a00669.php",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
            },
            {
              "name": "59362",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/59362"
            },
            {
              "name": "37154",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37154"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4292",
    "datePublished": "2009-12-10T23:00:00",
    "dateReserved": "2009-12-10T00:00:00",
    "dateUpdated": "2024-08-07T06:54:10.216Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-0887 (GCVE-0-2015-0887)

Vulnerability from cvelistv5 – Published: 2015-02-28 02:00 – Updated: 2024-08-06 04:26
VLAI?
Summary
npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.seil.jp/support/security/a01541.html x_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN63949115/index.html third-party-advisoryx_refsource_JVN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T04:26:11.341Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01541.html"
          },
          {
            "name": "JVNDB-2015-000031",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
          },
          {
            "name": "JVN#63949115",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN63949115/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2015-02-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-02-28T02:57:00",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01541.html"
        },
        {
          "name": "JVNDB-2015-000031",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
        },
        {
          "name": "JVN#63949115",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN63949115/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2015-0887",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.seil.jp/support/security/a01541.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01541.html"
            },
            {
              "name": "JVNDB-2015-000031",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
            },
            {
              "name": "JVN#63949115",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN63949115/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2015-0887",
    "datePublished": "2015-02-28T02:00:00",
    "dateReserved": "2015-01-08T00:00:00",
    "dateUpdated": "2024-08-06T04:26:11.341Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-2004 (GCVE-0-2014-2004)

Vulnerability from cvelistv5 – Published: 2014-06-16 14:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.seil.jp/support/security/a01443.html x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN10724763/index.html third-party-advisoryx_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:58:16.188Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01443.html"
          },
          {
            "name": "JVN#10724763",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN10724763/index.html"
          },
          {
            "name": "JVNDB-2014-000055",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-06-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-06-16T14:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01443.html"
        },
        {
          "name": "JVN#10724763",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN10724763/index.html"
        },
        {
          "name": "JVNDB-2014-000055",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-2004",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.seil.jp/support/security/a01443.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01443.html"
            },
            {
              "name": "JVN#10724763",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN10724763/index.html"
            },
            {
              "name": "JVNDB-2014-000055",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-2004",
    "datePublished": "2014-06-16T14:00:00",
    "dateReserved": "2014-02-17T00:00:00",
    "dateUpdated": "2024-08-06T09:58:16.188Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4708 (GCVE-0-2013-4708)

Vulnerability from cvelistv5 – Published: 2013-10-01 17:00 – Updated: 2024-09-17 01:15
VLAI?
Summary
The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.seil.jp/support/security/a01388.html x_refsource_CONFIRM
http://jvn.jp/en/jp/JVN40079308/index.html third-party-advisoryx_refsource_JVN
http://osvdb.org/97619 vdb-entryx_refsource_OSVDB
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-0… third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:52:27.107Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01388.html"
          },
          {
            "name": "JVN#40079308",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN40079308/index.html"
          },
          {
            "name": "97619",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/97619"
          },
          {
            "name": "JVNDB-2013-000091",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-10-01T17:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01388.html"
        },
        {
          "name": "JVN#40079308",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN40079308/index.html"
        },
        {
          "name": "97619",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/97619"
        },
        {
          "name": "JVNDB-2013-000091",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2013-4708",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.seil.jp/support/security/a01388.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01388.html"
            },
            {
              "name": "JVN#40079308",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN40079308/index.html"
            },
            {
              "name": "97619",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/97619"
            },
            {
              "name": "JVNDB-2013-000091",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2013-4708",
    "datePublished": "2013-10-01T17:00:00Z",
    "dateReserved": "2013-06-26T00:00:00Z",
    "dateUpdated": "2024-09-17T01:15:57.609Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-4709 (GCVE-0-2013-4709)

Vulnerability from cvelistv5 – Published: 2013-09-20 15:00 – Updated: 2024-09-16 17:58
VLAI?
Summary
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvn.jp/en/jp/JVN43152129/index.html third-party-advisoryx_refsource_JVN
http://www.seil.jp/support/security/a01396.html x_refsource_CONFIRM
http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:52:27.122Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#43152129",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN43152129/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01396.html"
          },
          {
            "name": "JVNDB-2013-000092",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-09-20T15:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#43152129",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN43152129/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01396.html"
        },
        {
          "name": "JVNDB-2013-000092",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2013-4709",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#43152129",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN43152129/index.html"
            },
            {
              "name": "http://www.seil.jp/support/security/a01396.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01396.html"
            },
            {
              "name": "JVNDB-2013-000092",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2013-4709",
    "datePublished": "2013-09-20T15:00:00Z",
    "dateReserved": "2013-06-26T00:00:00Z",
    "dateUpdated": "2024-09-16T17:58:50.809Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-0454 (GCVE-0-2011-0454)

Vulnerability from cvelistv5 – Published: 2011-03-01 22:00 – Updated: 2024-08-06 21:51
VLAI?
Summary
Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN88991166/index.html third-party-advisoryx_refsource_JVN
http://www.securityfocus.com/bid/46598 vdb-entryx_refsource_BID
http://www.seil.jp/support/security/a01001.html x_refsource_CONFIRM
http://secunia.com/advisories/43494 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:51:08.946Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVNDB-2011-000014",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
          },
          {
            "name": "JVN#88991166",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
          },
          {
            "name": "46598",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46598"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01001.html"
          },
          {
            "name": "43494",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43494"
          },
          {
            "name": "seil-pppac-bo(65672)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVNDB-2011-000014",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
        },
        {
          "name": "JVN#88991166",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
        },
        {
          "name": "46598",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46598"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01001.html"
        },
        {
          "name": "43494",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43494"
        },
        {
          "name": "seil-pppac-bo(65672)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2011-0454",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVNDB-2011-000014",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
            },
            {
              "name": "JVN#88991166",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN88991166/index.html"
            },
            {
              "name": "46598",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/46598"
            },
            {
              "name": "http://www.seil.jp/support/security/a01001.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01001.html"
            },
            {
              "name": "43494",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43494"
            },
            {
              "name": "seil-pppac-bo(65672)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2011-0454",
    "datePublished": "2011-03-01T22:00:00",
    "dateReserved": "2011-01-14T00:00:00",
    "dateUpdated": "2024-08-06T21:51:08.946Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-4409 (GCVE-0-2009-4409)

Vulnerability from cvelistv5 – Published: 2009-12-23 21:00 – Updated: 2024-09-17 01:35
VLAI?
Summary
The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/37628 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/37293 vdb-entryx_refsource_BID
http://jvn.jp/en/jp/JVN49602378/index.html third-party-advisoryx_refsource_JVN
http://www.osvdb.org/61118 vdb-entryx_refsource_OSVDB
http://www.seil.jp/seilseries/security/2009/a00697.php x_refsource_CONFIRM
http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-0… third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:01:20.198Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "37628",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37628"
          },
          {
            "name": "37293",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/37293"
          },
          {
            "name": "JVN#49602378",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN49602378/index.html"
          },
          {
            "name": "61118",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/61118"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/seilseries/security/2009/a00697.php"
          },
          {
            "name": "JVNDB-2009-000079",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000079.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-12-23T21:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "37628",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37628"
        },
        {
          "name": "37293",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/37293"
        },
        {
          "name": "JVN#49602378",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN49602378/index.html"
        },
        {
          "name": "61118",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/61118"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/seilseries/security/2009/a00697.php"
        },
        {
          "name": "JVNDB-2009-000079",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000079.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4409",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "37628",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37628"
            },
            {
              "name": "37293",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/37293"
            },
            {
              "name": "JVN#49602378",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN49602378/index.html"
            },
            {
              "name": "61118",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/61118"
            },
            {
              "name": "http://www.seil.jp/seilseries/security/2009/a00697.php",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/seilseries/security/2009/a00697.php"
            },
            {
              "name": "JVNDB-2009-000079",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000079.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4409",
    "datePublished": "2009-12-23T21:00:00Z",
    "dateReserved": "2009-12-23T00:00:00Z",
    "dateUpdated": "2024-09-17T01:35:32.632Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-4293 (GCVE-0-2009-4293)

Vulnerability from cvelistv5 – Published: 2009-12-10 23:00 – Updated: 2024-08-07 06:54
VLAI?
Summary
Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2009/3111 vdb-entryx_refsource_VUPEN
http://www.seil.jp/seilseries/security/2009/a00674.php x_refsource_CONFIRM
http://osvdb.org/59361 vdb-entryx_refsource_OSVDB
http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-0… third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN13011682/index.html third-party-advisoryx_refsource_JVN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/37154 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:54:10.459Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2009-3111",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3111"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
          },
          {
            "name": "59361",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/59361"
          },
          {
            "name": "JVNDB-2009-000070",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
          },
          {
            "name": "JVN#13011682",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN13011682/index.html"
          },
          {
            "name": "seil-gre-dos(54050)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
          },
          {
            "name": "37154",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37154"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-10-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2009-3111",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3111"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
        },
        {
          "name": "59361",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/59361"
        },
        {
          "name": "JVNDB-2009-000070",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
        },
        {
          "name": "JVN#13011682",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN13011682/index.html"
        },
        {
          "name": "seil-gre-dos(54050)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
        },
        {
          "name": "37154",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37154"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4293",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2009-3111",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3111"
            },
            {
              "name": "http://www.seil.jp/seilseries/security/2009/a00674.php",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
            },
            {
              "name": "59361",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/59361"
            },
            {
              "name": "JVNDB-2009-000070",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
            },
            {
              "name": "JVN#13011682",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN13011682/index.html"
            },
            {
              "name": "seil-gre-dos(54050)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
            },
            {
              "name": "37154",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37154"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4293",
    "datePublished": "2009-12-10T23:00:00",
    "dateReserved": "2009-12-10T00:00:00",
    "dateUpdated": "2024-08-07T06:54:10.459Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-4292 (GCVE-0-2009-4292)

Vulnerability from cvelistv5 – Published: 2009-12-10 23:00 – Updated: 2024-08-07 06:54
VLAI?
Summary
Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://jvn.jp/en/jp/JVN06362164/index.html third-party-advisoryx_refsource_JVN
http://www.vupen.com/english/advisories/2009/3111 vdb-entryx_refsource_VUPEN
http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-0… third-party-advisoryx_refsource_JVNDB
http://www.seil.jp/seilseries/security/2009/a00669.php x_refsource_CONFIRM
http://osvdb.org/59362 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/37154 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:54:10.216Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "seil-url-bo(54051)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
          },
          {
            "name": "JVN#06362164",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN06362164/index.html"
          },
          {
            "name": "ADV-2009-3111",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3111"
          },
          {
            "name": "JVNDB-2009-000069",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
          },
          {
            "name": "59362",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/59362"
          },
          {
            "name": "37154",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37154"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-10-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "seil-url-bo(54051)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
        },
        {
          "name": "JVN#06362164",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN06362164/index.html"
        },
        {
          "name": "ADV-2009-3111",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3111"
        },
        {
          "name": "JVNDB-2009-000069",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
        },
        {
          "name": "59362",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/59362"
        },
        {
          "name": "37154",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37154"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4292",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "seil-url-bo(54051)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
            },
            {
              "name": "JVN#06362164",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN06362164/index.html"
            },
            {
              "name": "ADV-2009-3111",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3111"
            },
            {
              "name": "JVNDB-2009-000069",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
            },
            {
              "name": "http://www.seil.jp/seilseries/security/2009/a00669.php",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
            },
            {
              "name": "59362",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/59362"
            },
            {
              "name": "37154",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37154"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4292",
    "datePublished": "2009-12-10T23:00:00",
    "dateReserved": "2009-12-10T00:00:00",
    "dateUpdated": "2024-08-07T06:54:10.216Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}