Search criteria

16 vulnerabilities found for SEIL/B1 by Internet Initiative Japan Inc.

CVE-2017-10856 (GCVE-0-2017-10856)

Vulnerability from cvelistv5 – Published: 2017-09-15 17:00 – Updated: 2024-08-05 17:50
VLAI?
Summary
SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device's encrypted communications via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
  • Denial-of-service (DoS)
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T17:50:12.562Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#76692689",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN76692689/index.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01811.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SEIL/X",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "4.60 to 5.72"
            }
          ]
        },
        {
          "product": "SEIL/B1",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "4.60 to 5.72"
            }
          ]
        },
        {
          "product": "SEIL/x86",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "3.20 to 5.72"
            }
          ]
        },
        {
          "product": "SEIL/BPV4",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "5.00 to 5.72"
            }
          ]
        }
      ],
      "datePublic": "2017-09-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device\u0027s encrypted communications via a specially crafted packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial-of-service (DoS)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-15T16:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#76692689",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "https://jvn.jp/en/jp/JVN76692689/index.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.seil.jp/support/security/a01811.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2017-10856",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SEIL/X",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "4.60 to 5.72"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/B1",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "4.60 to 5.72"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/x86",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "3.20 to 5.72"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/BPV4",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "5.00 to 5.72"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Internet Initiative Japan Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device\u0027s encrypted communications via a specially crafted packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial-of-service (DoS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#76692689",
              "refsource": "JVN",
              "url": "https://jvn.jp/en/jp/JVN76692689/index.html"
            },
            {
              "name": "http://www.seil.jp/support/security/a01811.html",
              "refsource": "MISC",
              "url": "http://www.seil.jp/support/security/a01811.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2017-10856",
    "datePublished": "2017-09-15T17:00:00",
    "dateReserved": "2017-07-04T00:00:00",
    "dateUpdated": "2024-08-05T17:50:12.562Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-2153 (GCVE-0-2017-2153)

Vulnerability from cvelistv5 – Published: 2017-04-28 16:00 – Updated: 2024-08-05 13:48
VLAI?
Summary
SEIL/x86 Fuji 1.70 to 5.62, SEIL/BPV4 5.00 to 5.62, SEIL/X1 1.30 to 5.62, SEIL/X2 1.30 to 5.62, SEIL/B1 1.00 to 5.62 allows remote attackers to cause a denial of service via specially crafted IPv4 UDP packets.
Severity ?
No CVSS data available.
CWE
  • Denial-of-service (DoS)
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T13:48:04.413Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01783.html"
          },
          {
            "name": "JVN#86171513",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN86171513/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SEIL/x86 Fuji",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "1.70 to 5.62"
            }
          ]
        },
        {
          "product": "SEIL/BPV4",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "5.00 to 5.62"
            }
          ]
        },
        {
          "product": "SEIL/X1",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "1.30 to 5.62"
            }
          ]
        },
        {
          "product": "SEIL/X2",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "1.30 to 5.62"
            }
          ]
        },
        {
          "product": "SEIL/B1",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "1.00 to 5.62"
            }
          ]
        }
      ],
      "datePublic": "2017-04-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SEIL/x86 Fuji 1.70 to 5.62, SEIL/BPV4 5.00 to 5.62, SEIL/X1 1.30 to 5.62, SEIL/X2 1.30 to 5.62, SEIL/B1 1.00 to 5.62 allows remote attackers to cause a denial of service via specially crafted IPv4 UDP packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial-of-service (DoS)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-04-28T15:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.seil.jp/support/security/a01783.html"
        },
        {
          "name": "JVN#86171513",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN86171513/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2017-2153",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SEIL/x86 Fuji",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.70 to 5.62"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/BPV4",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "5.00 to 5.62"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/X1",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.30 to 5.62"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/X2",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.30 to 5.62"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/B1",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.00 to 5.62"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Internet Initiative Japan Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SEIL/x86 Fuji 1.70 to 5.62, SEIL/BPV4 5.00 to 5.62, SEIL/X1 1.30 to 5.62, SEIL/X2 1.30 to 5.62, SEIL/B1 1.00 to 5.62 allows remote attackers to cause a denial of service via specially crafted IPv4 UDP packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial-of-service (DoS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.seil.jp/support/security/a01783.html",
              "refsource": "MISC",
              "url": "http://www.seil.jp/support/security/a01783.html"
            },
            {
              "name": "JVN#86171513",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN86171513/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2017-2153",
    "datePublished": "2017-04-28T16:00:00",
    "dateReserved": "2016-12-01T00:00:00",
    "dateUpdated": "2024-08-05T13:48:04.413Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-10856 (GCVE-0-2017-10856)

Vulnerability from nvd – Published: 2017-09-15 17:00 – Updated: 2024-08-05 17:50
VLAI?
Summary
SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device's encrypted communications via a specially crafted packet.
Severity ?
No CVSS data available.
CWE
  • Denial-of-service (DoS)
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T17:50:12.562Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#76692689",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "https://jvn.jp/en/jp/JVN76692689/index.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01811.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SEIL/X",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "4.60 to 5.72"
            }
          ]
        },
        {
          "product": "SEIL/B1",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "4.60 to 5.72"
            }
          ]
        },
        {
          "product": "SEIL/x86",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "3.20 to 5.72"
            }
          ]
        },
        {
          "product": "SEIL/BPV4",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "5.00 to 5.72"
            }
          ]
        }
      ],
      "datePublic": "2017-09-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device\u0027s encrypted communications via a specially crafted packet."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial-of-service (DoS)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-15T16:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#76692689",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "https://jvn.jp/en/jp/JVN76692689/index.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.seil.jp/support/security/a01811.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2017-10856",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SEIL/X",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "4.60 to 5.72"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/B1",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "4.60 to 5.72"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/x86",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "3.20 to 5.72"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/BPV4",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "5.00 to 5.72"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Internet Initiative Japan Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device\u0027s encrypted communications via a specially crafted packet."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial-of-service (DoS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#76692689",
              "refsource": "JVN",
              "url": "https://jvn.jp/en/jp/JVN76692689/index.html"
            },
            {
              "name": "http://www.seil.jp/support/security/a01811.html",
              "refsource": "MISC",
              "url": "http://www.seil.jp/support/security/a01811.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2017-10856",
    "datePublished": "2017-09-15T17:00:00",
    "dateReserved": "2017-07-04T00:00:00",
    "dateUpdated": "2024-08-05T17:50:12.562Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-2153 (GCVE-0-2017-2153)

Vulnerability from nvd – Published: 2017-04-28 16:00 – Updated: 2024-08-05 13:48
VLAI?
Summary
SEIL/x86 Fuji 1.70 to 5.62, SEIL/BPV4 5.00 to 5.62, SEIL/X1 1.30 to 5.62, SEIL/X2 1.30 to 5.62, SEIL/B1 1.00 to 5.62 allows remote attackers to cause a denial of service via specially crafted IPv4 UDP packets.
Severity ?
No CVSS data available.
CWE
  • Denial-of-service (DoS)
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T13:48:04.413Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01783.html"
          },
          {
            "name": "JVN#86171513",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN86171513/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SEIL/x86 Fuji",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "1.70 to 5.62"
            }
          ]
        },
        {
          "product": "SEIL/BPV4",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "5.00 to 5.62"
            }
          ]
        },
        {
          "product": "SEIL/X1",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "1.30 to 5.62"
            }
          ]
        },
        {
          "product": "SEIL/X2",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "1.30 to 5.62"
            }
          ]
        },
        {
          "product": "SEIL/B1",
          "vendor": "Internet Initiative Japan Inc.",
          "versions": [
            {
              "status": "affected",
              "version": "1.00 to 5.62"
            }
          ]
        }
      ],
      "datePublic": "2017-04-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SEIL/x86 Fuji 1.70 to 5.62, SEIL/BPV4 5.00 to 5.62, SEIL/X1 1.30 to 5.62, SEIL/X2 1.30 to 5.62, SEIL/B1 1.00 to 5.62 allows remote attackers to cause a denial of service via specially crafted IPv4 UDP packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial-of-service (DoS)",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-04-28T15:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.seil.jp/support/security/a01783.html"
        },
        {
          "name": "JVN#86171513",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN86171513/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2017-2153",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SEIL/x86 Fuji",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.70 to 5.62"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/BPV4",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "5.00 to 5.62"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/X1",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.30 to 5.62"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/X2",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.30 to 5.62"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SEIL/B1",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.00 to 5.62"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Internet Initiative Japan Inc."
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SEIL/x86 Fuji 1.70 to 5.62, SEIL/BPV4 5.00 to 5.62, SEIL/X1 1.30 to 5.62, SEIL/X2 1.30 to 5.62, SEIL/B1 1.00 to 5.62 allows remote attackers to cause a denial of service via specially crafted IPv4 UDP packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial-of-service (DoS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.seil.jp/support/security/a01783.html",
              "refsource": "MISC",
              "url": "http://www.seil.jp/support/security/a01783.html"
            },
            {
              "name": "JVN#86171513",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN86171513/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2017-2153",
    "datePublished": "2017-04-28T16:00:00",
    "dateReserved": "2016-12-01T00:00:00",
    "dateUpdated": "2024-08-05T13:48:04.413Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

JVNDB-2017-000222

Vulnerability from jvndb - Published: 2017-09-11 15:19 - Updated:2018-02-28 14:12
Severity ?
Summary
SEIL Series routers vulnerable to denial-of-service (DoS)
Details
The IPsec/IKE function in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing certain packets. Internet Initiative Japan Inc. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Internet Initiative Japan Inc. coordinated under the Information Security Early Warning Partnership.
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000222.html",
  "dc:date": "2018-02-28T14:12+09:00",
  "dcterms:issued": "2017-09-11T15:19+09:00",
  "dcterms:modified": "2018-02-28T14:12+09:00",
  "description": "The IPsec/IKE function in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing certain packets.\r\n\r\nInternet Initiative Japan Inc. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Internet Initiative Japan Inc. coordinated under the Information Security Early Warning Partnership.",
  "link": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000222.html",
  "sec:cpe": [
    {
      "#text": "cpe:/h:iij:seil%2Fb1",
      "@product": "SEIL/B1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fbpv4",
      "@product": "SEIL/BPV4",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx",
      "@product": "SEIL/X",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx86",
      "@product": "SEIL/x86",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": [
    {
      "@score": "5.0",
      "@severity": "Medium",
      "@type": "Base",
      "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "@version": "2.0"
    },
    {
      "@score": "5.3",
      "@severity": "Medium",
      "@type": "Base",
      "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
      "@version": "3.0"
    }
  ],
  "sec:identifier": "JVNDB-2017-000222",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN76692689/index.html",
      "@id": "JVN#76692689",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10856",
      "@id": "CVE-2017-10856",
      "@source": "CVE"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2017-10856",
      "@id": "CVE-2017-10856",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-noinfo",
      "@title": "No Mapping(CWE-noinfo)"
    }
  ],
  "title": "SEIL Series routers vulnerable to denial-of-service (DoS)"
}

JVNDB-2017-000071

Vulnerability from jvndb - Published: 2017-04-19 14:43 - Updated:2017-06-06 14:50
Severity ?
Summary
SEIL Series routers vulnerable to denial-of-service (DoS)
Details
The DNS forwarder, the PPP Access Concentrator (L2TP) and the Measure(iPerf server) function in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing certain packets. Internet Initiative Japan Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Internet Initiative Japan Inc. coordinated under the Information Security Early Warning Partnership.
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000071.html",
  "dc:date": "2017-06-06T14:50+09:00",
  "dcterms:issued": "2017-04-19T14:43+09:00",
  "dcterms:modified": "2017-06-06T14:50+09:00",
  "description": "The DNS forwarder, the PPP Access Concentrator (L2TP) and the Measure(iPerf server) function in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing certain packets.\r\n\r\nInternet Initiative Japan Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Internet Initiative Japan Inc. coordinated under the Information Security Early Warning Partnership.",
  "link": "https://jvndb.jvn.jp/en/contents/2017/JVNDB-2017-000071.html",
  "sec:cpe": [
    {
      "#text": "cpe:/h:iij:seil%2Fb1",
      "@product": "SEIL/B1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fbpv4",
      "@product": "SEIL/BPV4",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx1",
      "@product": "SEIL/X1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx2",
      "@product": "SEIL/X2",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil_x86_fuji",
      "@product": "SEIL/x86 Fuji",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": [
    {
      "@score": "5.0",
      "@severity": "Medium",
      "@type": "Base",
      "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "@version": "2.0"
    },
    {
      "@score": "5.3",
      "@severity": "Medium",
      "@type": "Base",
      "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
      "@version": "3.0"
    }
  ],
  "sec:identifier": "JVNDB-2017-000071",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/jp/JVN86171513/index.html",
      "@id": "JVN#86171513",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2153",
      "@id": "CVE-2017-2153",
      "@source": "CVE"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2017-2153",
      "@id": "CVE-2017-2153",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-Other",
      "@title": "No Mapping(CWE-Other)"
    }
  ],
  "title": "SEIL Series routers vulnerable to denial-of-service (DoS)"
}

JVNDB-2015-000031

Vulnerability from jvndb - Published: 2015-02-27 15:39 - Updated:2015-03-05 15:42
Severity ?
() - -
Summary
SEIL Series routers vulnerable to denial-of-service (DoS)
Details
The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing SSTP packets.
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000031.html",
  "dc:date": "2015-03-05T15:42+09:00",
  "dcterms:issued": "2015-02-27T15:39+09:00",
  "dcterms:modified": "2015-03-05T15:42+09:00",
  "description": "The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing SSTP packets.",
  "link": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000031.html",
  "sec:cpe": [
    {
      "#text": "cpe:/h:iij:seil%2Fb1",
      "@product": "SEIL/B1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx1",
      "@product": "SEIL/X1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx2",
      "@product": "SEIL/X2",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil_x86_fuji",
      "@product": "SEIL/x86 Fuji",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "4.3",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2015-000031",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN63949115/index.html",
      "@id": "JVN#63949115",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0887",
      "@id": "CVE-2015-0887",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-0887",
      "@id": "CVE-2015-0887",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-noinfo",
      "@title": "No Mapping(CWE-noinfo)"
    }
  ],
  "title": "SEIL Series routers vulnerable to denial-of-service (DoS)"
}

JVNDB-2014-000136

Vulnerability from jvndb - Published: 2014-12-01 15:24 - Updated:2014-12-09 15:31
Severity ?
() - -
Summary
SEIL Series routers vulnerable to denial-of-service (DoS)
Details
The PPP Access Concentrator (PPPAC) and the Dial-Up Networking in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to an issue in processing certain packets (CWE-119). Note that this vulnerability is different from JVN#21907573.
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000136.html",
  "dc:date": "2014-12-09T15:31+09:00",
  "dcterms:issued": "2014-12-01T15:24+09:00",
  "dcterms:modified": "2014-12-09T15:31+09:00",
  "description": "The PPP Access Concentrator (PPPAC) and the Dial-Up Networking in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to an issue in processing certain packets (CWE-119).\r\n\r\nNote that this vulnerability is different from JVN#21907573.",
  "link": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000136.html",
  "sec:cpe": [
    {
      "#text": "cpe:/h:iij:seil%2Fb1",
      "@product": "SEIL/B1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fneu_2fe_plus",
      "@product": "SEIL/neu 2FE Plus",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fturbo",
      "@product": "SEIL/Turbo",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx1",
      "@product": "SEIL/X1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx2",
      "@product": "SEIL/X2",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil_x86_fuji",
      "@product": "SEIL/x86 Fuji",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "5.0",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2014-000136",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN04895240/index.html",
      "@id": "JVN#04895240",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7256",
      "@id": "CVE-2014-7256",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7256",
      "@id": "CVE-2014-7256",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-119",
      "@title": "Buffer Errors(CWE-119)"
    }
  ],
  "title": "SEIL Series routers vulnerable to denial-of-service (DoS)"
}

JVNDB-2014-000135

Vulnerability from jvndb - Published: 2014-12-01 15:18 - Updated:2014-12-09 15:32
Severity ?
() - -
Summary
SEIL Series routers vulnerable to denial-of-service (DoS)
Details
SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to an issue in processing NTP requests. Note that this vulnerability is different from JVN#04895240.
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000135.html",
  "dc:date": "2014-12-09T15:32+09:00",
  "dcterms:issued": "2014-12-01T15:18+09:00",
  "dcterms:modified": "2014-12-09T15:32+09:00",
  "description": "SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to an issue in processing NTP requests.\r\n\r\nNote that this vulnerability is different from JVN#04895240.",
  "link": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000135.html",
  "sec:cpe": [
    {
      "#text": "cpe:/h:iij:seil%2Fb1",
      "@product": "SEIL/B1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx1",
      "@product": "SEIL/X1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx2",
      "@product": "SEIL/X2",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil_x86_fuji",
      "@product": "SEIL/x86 Fuji",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "5.0",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2014-000135",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN21907573/index.html",
      "@id": "JVN#21907573",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7255",
      "@id": "CVE-2014-7255",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7255",
      "@id": "CVE-2014-7255",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-Other",
      "@title": "No Mapping(CWE-Other)"
    }
  ],
  "title": "SEIL Series routers vulnerable to denial-of-service (DoS)"
}

JVNDB-2014-000055

Vulnerability from jvndb - Published: 2014-06-13 12:44 - Updated:2014-06-17 16:11

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000055.html",
  "dc:date": "2014-06-17T16:11+09:00",
  "dcterms:issued": "2014-06-13T12:44+09:00",
  "dcterms:modified": "2014-06-17T16:11+09:00",
  "description": "The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to an issue in processing certain packets. (CWE-119)",
  "link": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000055.html",
  "sec:cpe": [
    {
      "#text": "cpe:/h:iij:seil%2Fb1",
      "@product": "SEIL/B1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fneu_2fe_plus",
      "@product": "SEIL/neu 2FE Plus",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fturbo",
      "@product": "SEIL/Turbo",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx1",
      "@product": "SEIL/X1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx2",
      "@product": "SEIL/X2",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx86",
      "@product": "SEIL/x86",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fb1_firmware",
      "@product": "SEIL/B1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fneu_2fe_plus_firmware",
      "@product": "SEIL/neu 2FE Plus firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fturbo_firmware",
      "@product": "SEIL/Turbo firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx1_firmware",
      "@product": "SEIL/X1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx2_firmware",
      "@product": "SEIL/X2 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx86_firmware",
      "@product": "SEIL/x86 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "5.0",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2014-000055",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN10724763/index.html",
      "@id": "JVN#10724763",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2004",
      "@id": "CVE-2014-2004",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2004",
      "@id": "CVE-2014-2004",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-119",
      "@title": "Buffer Errors(CWE-119)"
    }
  ],
  "title": "SEIL Series routers vulnerable to denial-of-service (DoS)"
}

JVNDB-2013-000092

Vulnerability from jvndb - Published: 2013-09-20 14:57 - Updated:2013-09-30 16:46

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000092.html",
  "dc:date": "2013-09-30T16:46+09:00",
  "dcterms:issued": "2013-09-20T14:57+09:00",
  "dcterms:modified": "2013-09-30T16:46+09:00",
  "description": "SEIL Series routers contain a buffer overflow vulnerability.\r\n\r\nThe PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contains a buffer overflow vulnerability in processing L2TP messages.",
  "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000092.html",
  "sec:cpe": [
    {
      "#text": "cpe:/h:iij:seil%2Fb1",
      "@product": "SEIL/B1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fneu_2fe_plus",
      "@product": "SEIL/neu 2FE Plus",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fturbo",
      "@product": "SEIL/Turbo",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx1",
      "@product": "SEIL/X1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx2",
      "@product": "SEIL/X2",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx86",
      "@product": "SEIL/x86",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fb1_firmware",
      "@product": "SEIL/B1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fneu_2fe_plus_firmware",
      "@product": "SEIL/neu 2FE Plus firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fturbo_firmware",
      "@product": "SEIL/Turbo firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx1_firmware",
      "@product": "SEIL/X1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx2_firmware",
      "@product": "SEIL/X2 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx86_firmware",
      "@product": "SEIL/x86 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "7.5",
    "@severity": "High",
    "@type": "Base",
    "@vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2013-000092",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/jp/JVN43152129/",
      "@id": "JVN#43152129",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4709",
      "@id": "CVE-2013-4709",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=http://support.apple.com/kb/CVE-2013-4709",
      "@id": "CVE-2013-4709",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-119",
      "@title": "Buffer Errors(CWE-119)"
    }
  ],
  "title": "SEIL Series routers vulnerable to buffer overflow"
}

JVNDB-2013-000091

Vulnerability from jvndb - Published: 2013-09-20 14:52 - Updated:2013-10-08 15:36

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000091.html",
  "dc:date": "2013-10-08T15:36+09:00",
  "dcterms:issued": "2013-09-20T14:52+09:00",
  "dcterms:modified": "2013-10-08T15:36+09:00",
  "description": "SEIL Series routers contain a vulnerability in RADIUS authentication.\r\n\r\nThe PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contains an issue when generating random numbers used for RADIUS authentication, which may result in the generated random numbers to be easily predicted.",
  "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000091.html",
  "sec:cpe": [
    {
      "#text": "cpe:/h:iij:seil%2Fb1",
      "@product": "SEIL/B1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fneu_2fe_plus",
      "@product": "SEIL/neu 2FE Plus",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fturbo",
      "@product": "SEIL/Turbo",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx1",
      "@product": "SEIL/X1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx2",
      "@product": "SEIL/X2",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx86",
      "@product": "SEIL/x86",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fb1_firmware",
      "@product": "SEIL/B1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fneu_2fe_plus_firmware",
      "@product": "SEIL/neu 2FE Plus firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fturbo_firmware",
      "@product": "SEIL/Turbo firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx1_firmware",
      "@product": "SEIL/X1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx2_firmware",
      "@product": "SEIL/X2 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx86_firmware",
      "@product": "SEIL/x86 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "4.0",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2013-000091",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/jp/JVN40079308/",
      "@id": "JVN#40079308",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4708",
      "@id": "CVE-2013-4708",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4708",
      "@id": "CVE-2013-4708",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-Other",
      "@title": "No Mapping(CWE-Other)"
    }
  ],
  "title": "SEIL Series routers vulnerable in RADIUS authentication"
}

JVNDB-2010-000032

Vulnerability from jvndb - Published: 2010-08-25 13:54 - Updated:2010-08-25 13:54
Severity ?
() - -
Summary
SEIL/X Series and SEIL/B1 IPv6 Unicast RPF vulnerability
Details
SEIL/X Series and SEIL/B1 contains a vulnerability in which IPv6 Unicast Reverse Path Forwarding (RPF) does not properly function in strict mode. SEIL/X Series and SEIL/B1 are routers. SEIL/X Series and SEIL/B1 contains a vulnerability in which IPv6 Unicast Reverse Path Forwarding (RPF) does not properly function in strict mode. Only IPv6 Unicast RPF in strict mode is vulnerable. According to the developer, IPv6 Unicast RPF in loose mode and IPv4 Unicast RPF are not affected by this vulnerability.
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html",
  "dc:date": "2010-08-25T13:54+09:00",
  "dcterms:issued": "2010-08-25T13:54+09:00",
  "dcterms:modified": "2010-08-25T13:54+09:00",
  "description": "SEIL/X Series and SEIL/B1 contains a vulnerability in which  IPv6 Unicast Reverse Path Forwarding (RPF) does not properly function in strict mode.\r\n\r\nSEIL/X Series and SEIL/B1 are routers. SEIL/X Series and SEIL/B1 contains a vulnerability in which  IPv6 Unicast Reverse Path Forwarding (RPF) does not properly function in strict mode.\r\n\r\nOnly IPv6 Unicast RPF in strict mode is vulnerable. According to the developer, IPv6 Unicast RPF in loose mode and IPv4 Unicast RPF are not affected by this vulnerability.",
  "link": "https://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html",
  "sec:cpe": [
    {
      "#text": "cpe:/h:iij:seil%2Fb1",
      "@product": "SEIL/B1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx1",
      "@product": "SEIL/X1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx2",
      "@product": "SEIL/X2",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "4.3",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2010-000032",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN12683004/index.html",
      "@id": "JVN#12683004",
      "@source": "JVN"
    },
    {
      "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2363",
      "@id": "CVE-2010-2363",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2363",
      "@id": "CVE-2010-2363",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-Other",
      "@title": "No Mapping(CWE-Other)"
    }
  ],
  "title": "SEIL/X Series and SEIL/B1 IPv6 Unicast RPF vulnerability"
}

JVNDB-2009-000079

Vulnerability from jvndb - Published: 2009-12-09 19:38 - Updated:2009-12-09 19:38
Severity ?
() - -
Summary
SEIL/B1 authentication issue
Details
SEIL/B1 contains an issue in the implementation of the PPP Access Concentrator (PPPAC) function, which may allow replay attacks to be performed during the authentication process. The PPP Access Concentrator (PPPAC) function within SEIL/B1 contains an issue in the CHAP and MS-CHAP-V2 authentication processes, the same challenge value is repeatedly used for each authentication attempt.
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000079.html",
  "dc:date": "2009-12-09T19:38+09:00",
  "dcterms:issued": "2009-12-09T19:38+09:00",
  "dcterms:modified": "2009-12-09T19:38+09:00",
  "description": "SEIL/B1 contains an issue in the implementation of the PPP Access Concentrator (PPPAC) function, which may allow replay attacks to be performed during the authentication process.\r\n\r\nThe PPP Access Concentrator (PPPAC) function within SEIL/B1 contains an issue in the CHAP and MS-CHAP-V2 authentication processes, the same challenge value is repeatedly used for each authentication attempt.",
  "link": "https://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000079.html",
  "sec:cpe": {
    "#text": "cpe:/h:iij:seil%2Fb1",
    "@product": "SEIL/B1",
    "@vendor": "Internet Initiative Japan Inc.",
    "@version": "2.2"
  },
  "sec:cvss": {
    "@score": "2.6",
    "@severity": "Low",
    "@type": "Base",
    "@vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2009-000079",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN49602378/index.html",
      "@id": "JVN#49602378",
      "@source": "JVN"
    },
    {
      "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4409",
      "@id": "CVE-2009-4409",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-4409",
      "@id": "CVE-2009-4409",
      "@source": "NVD"
    },
    {
      "#text": "http://secunia.com/advisories/37628",
      "@id": "SA37628",
      "@source": "SECUNIA"
    },
    {
      "#text": "http://www.securityfocus.com/bid/37293",
      "@id": "37293",
      "@source": "BID"
    },
    {
      "#text": "http://www.osvdb.org/61118",
      "@id": "61118",
      "@source": "OSVDB"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-287",
      "@title": "Improper Authentication(CWE-287)"
    }
  ],
  "title": "SEIL/B1 authentication issue"
}

JVNDB-2009-000069

Vulnerability from jvndb - Published: 2009-11-02 16:42 - Updated:2009-11-02 16:42
Severity ?
() - -
Summary
SEIL/X Series and SEIL/B1 buffer overflow vulnerability
Details
SEIL/X Series and SEIL/B1 contain a buffer overflow vulnerability. SEIL/X Series and SEIL/B1 are routers. SEIL/X Series and SEIL/B1 contain an issue in the processing by the URL filtering function, which may lead to a buffer overflow vulnerability.
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html",
  "dc:date": "2009-11-02T16:42+09:00",
  "dcterms:issued": "2009-11-02T16:42+09:00",
  "dcterms:modified": "2009-11-02T16:42+09:00",
  "description": "SEIL/X Series and SEIL/B1 contain a buffer overflow vulnerability.\r\n\r\nSEIL/X Series and SEIL/B1 are routers. SEIL/X Series and SEIL/B1 contain an issue in the processing by the URL filtering function, which may lead to a buffer overflow vulnerability.",
  "link": "https://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html",
  "sec:cpe": [
    {
      "#text": "cpe:/h:iij:seil%2Fb1",
      "@product": "SEIL/B1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx1",
      "@product": "SEIL/X1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx2",
      "@product": "SEIL/X2",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "9.3",
    "@severity": "High",
    "@type": "Base",
    "@vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2009-000069",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN06362164/index.html",
      "@id": "JVN#06362164",
      "@source": "JVN"
    },
    {
      "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4292",
      "@id": "CVE-2009-4292",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-4292",
      "@id": "CVE-2009-4292",
      "@source": "NVD"
    },
    {
      "#text": "http://secunia.com/advisories/37154",
      "@id": "SA37154",
      "@source": "SECUNIA"
    },
    {
      "#text": "http://xforce.iss.net/xforce/xfdb/54050",
      "@id": "54050",
      "@source": "XF"
    },
    {
      "#text": "http://www.vupen.com/english/advisories/2009/3111",
      "@id": "VUPEN/ADV-2009-3111",
      "@source": "VUPEN"
    },
    {
      "#text": "http://osvdb.org/59361",
      "@id": "59361",
      "@source": "OSVDB"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-119",
      "@title": "Buffer Errors(CWE-119)"
    }
  ],
  "title": "SEIL/X Series and SEIL/B1 buffer overflow vulnerability"
}

JVNDB-2009-000070

Vulnerability from jvndb - Published: 2009-11-02 16:42 - Updated:2009-11-02 16:42
Severity ?
() - -
Summary
SEIL/X Series and SEIL/B1 denial of service vulnerability
Details
SEIL/X Series and SEIL/B1 contain a denial of service (DoS) vulnerability. SEIL/X Series and SEIL/B1 are routers. SEIL/X Series and SEIL/B1 contain an issue in the processing by the NAT function, which may lead to a denial of service (DoS) vulnerability.
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html",
  "dc:date": "2009-11-02T16:42+09:00",
  "dcterms:issued": "2009-11-02T16:42+09:00",
  "dcterms:modified": "2009-11-02T16:42+09:00",
  "description": "SEIL/X Series and SEIL/B1 contain a denial of service (DoS) vulnerability.\r\n\r\nSEIL/X Series and SEIL/B1 are routers. SEIL/X Series and SEIL/B1 contain an issue in the processing by the NAT function, which may lead to a denial of service (DoS) vulnerability.",
  "link": "https://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html",
  "sec:cpe": [
    {
      "#text": "cpe:/h:iij:seil%2Fb1",
      "@product": "SEIL/B1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx1",
      "@product": "SEIL/X1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx2",
      "@product": "SEIL/X2",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "7.8",
    "@severity": "High",
    "@type": "Base",
    "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2009-000070",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN13011682/index.html",
      "@id": "JVN#13011682",
      "@source": "JVN"
    },
    {
      "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4293",
      "@id": "CVE-2009-4293",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-4293",
      "@id": "CVE-2009-4293",
      "@source": "NVD"
    },
    {
      "#text": "http://secunia.com/advisories/37154",
      "@id": "SA37154",
      "@source": "SECUNIA"
    },
    {
      "#text": "http://xforce.iss.net/xforce/xfdb/54050",
      "@id": "54050",
      "@source": "XF"
    },
    {
      "#text": "http://www.vupen.com/english/advisories/2009/3111",
      "@id": "VUPEN/ADV-2009-3111",
      "@source": "VUPEN"
    },
    {
      "#text": "http://osvdb.org/59361",
      "@id": "59361",
      "@source": "OSVDB"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-20",
      "@title": "Improper Input Validation(CWE-20)"
    }
  ],
  "title": "SEIL/X Series and SEIL/B1 denial of service vulnerability"
}