Search criteria

5 vulnerabilities found for SEIL/X2 firmware by Internet Initiative Japan Inc.

JVNDB-2014-000055

Vulnerability from jvndb - Published: 2014-06-13 12:44 - Updated:2014-06-17 16:11

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000055.html",
  "dc:date": "2014-06-17T16:11+09:00",
  "dcterms:issued": "2014-06-13T12:44+09:00",
  "dcterms:modified": "2014-06-17T16:11+09:00",
  "description": "The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to an issue in processing certain packets. (CWE-119)",
  "link": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000055.html",
  "sec:cpe": [
    {
      "#text": "cpe:/h:iij:seil%2Fb1",
      "@product": "SEIL/B1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fneu_2fe_plus",
      "@product": "SEIL/neu 2FE Plus",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fturbo",
      "@product": "SEIL/Turbo",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx1",
      "@product": "SEIL/X1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx2",
      "@product": "SEIL/X2",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx86",
      "@product": "SEIL/x86",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fb1_firmware",
      "@product": "SEIL/B1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fneu_2fe_plus_firmware",
      "@product": "SEIL/neu 2FE Plus firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fturbo_firmware",
      "@product": "SEIL/Turbo firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx1_firmware",
      "@product": "SEIL/X1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx2_firmware",
      "@product": "SEIL/X2 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx86_firmware",
      "@product": "SEIL/x86 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "5.0",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2014-000055",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN10724763/index.html",
      "@id": "JVN#10724763",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2004",
      "@id": "CVE-2014-2004",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-2004",
      "@id": "CVE-2014-2004",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-119",
      "@title": "Buffer Errors(CWE-119)"
    }
  ],
  "title": "SEIL Series routers vulnerable to denial-of-service (DoS)"
}

JVNDB-2013-000092

Vulnerability from jvndb - Published: 2013-09-20 14:57 - Updated:2013-09-30 16:46

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000092.html",
  "dc:date": "2013-09-30T16:46+09:00",
  "dcterms:issued": "2013-09-20T14:57+09:00",
  "dcterms:modified": "2013-09-30T16:46+09:00",
  "description": "SEIL Series routers contain a buffer overflow vulnerability.\r\n\r\nThe PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contains a buffer overflow vulnerability in processing L2TP messages.",
  "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000092.html",
  "sec:cpe": [
    {
      "#text": "cpe:/h:iij:seil%2Fb1",
      "@product": "SEIL/B1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fneu_2fe_plus",
      "@product": "SEIL/neu 2FE Plus",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fturbo",
      "@product": "SEIL/Turbo",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx1",
      "@product": "SEIL/X1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx2",
      "@product": "SEIL/X2",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx86",
      "@product": "SEIL/x86",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fb1_firmware",
      "@product": "SEIL/B1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fneu_2fe_plus_firmware",
      "@product": "SEIL/neu 2FE Plus firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fturbo_firmware",
      "@product": "SEIL/Turbo firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx1_firmware",
      "@product": "SEIL/X1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx2_firmware",
      "@product": "SEIL/X2 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx86_firmware",
      "@product": "SEIL/x86 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "7.5",
    "@severity": "High",
    "@type": "Base",
    "@vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2013-000092",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/jp/JVN43152129/",
      "@id": "JVN#43152129",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4709",
      "@id": "CVE-2013-4709",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=http://support.apple.com/kb/CVE-2013-4709",
      "@id": "CVE-2013-4709",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-119",
      "@title": "Buffer Errors(CWE-119)"
    }
  ],
  "title": "SEIL Series routers vulnerable to buffer overflow"
}

JVNDB-2013-000091

Vulnerability from jvndb - Published: 2013-09-20 14:52 - Updated:2013-10-08 15:36

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000091.html",
  "dc:date": "2013-10-08T15:36+09:00",
  "dcterms:issued": "2013-09-20T14:52+09:00",
  "dcterms:modified": "2013-10-08T15:36+09:00",
  "description": "SEIL Series routers contain a vulnerability in RADIUS authentication.\r\n\r\nThe PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contains an issue when generating random numbers used for RADIUS authentication, which may result in the generated random numbers to be easily predicted.",
  "link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000091.html",
  "sec:cpe": [
    {
      "#text": "cpe:/h:iij:seil%2Fb1",
      "@product": "SEIL/B1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fneu_2fe_plus",
      "@product": "SEIL/neu 2FE Plus",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fturbo",
      "@product": "SEIL/Turbo",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx1",
      "@product": "SEIL/X1",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx2",
      "@product": "SEIL/X2",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:iij:seil%2Fx86",
      "@product": "SEIL/x86",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fb1_firmware",
      "@product": "SEIL/B1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fneu_2fe_plus_firmware",
      "@product": "SEIL/neu 2FE Plus firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fturbo_firmware",
      "@product": "SEIL/Turbo firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx1_firmware",
      "@product": "SEIL/X1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx2_firmware",
      "@product": "SEIL/X2 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx86_firmware",
      "@product": "SEIL/x86 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "4.0",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2013-000091",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/jp/JVN40079308/",
      "@id": "JVN#40079308",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4708",
      "@id": "CVE-2013-4708",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4708",
      "@id": "CVE-2013-4708",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-Other",
      "@title": "No Mapping(CWE-Other)"
    }
  ],
  "title": "SEIL Series routers vulnerable in RADIUS authentication"
}

JVNDB-2012-000059

Vulnerability from jvndb - Published: 2012-06-06 12:39 - Updated:2012-06-06 12:39
Severity ?
() - -
Summary
SEIL series fail to restrict access permissions
Details
SEIL series contain an issue where access permissions are not restricted. SEIL series are wireless LAN routers. SEIL series contain an issue where access permissions are not restricted.
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000059.html",
  "dc:date": "2012-06-06T12:39+09:00",
  "dcterms:issued": "2012-06-06T12:39+09:00",
  "dcterms:modified": "2012-06-06T12:39+09:00",
  "description": "SEIL series contain an issue where access permissions are not restricted.\r\n\r\nSEIL series are wireless LAN routers. SEIL series contain an issue where access permissions are not restricted.",
  "link": "https://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000059.html",
  "sec:cpe": [
    {
      "#text": "cpe:/o:iij:seil%252fb1_firmware",
      "@product": "SEIL/B1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx1_firmware",
      "@product": "SEIL/X1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx2_firmware",
      "@product": "SEIL/X2 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx86_firmware",
      "@product": "SEIL/x86 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "5.0",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2012-000059",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN24646833/index.html",
      "@id": "JVN#24646833",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2632",
      "@id": "CVE-2012-2632",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2632",
      "@id": "CVE-2012-2632",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-264",
      "@title": "Permissions(CWE-264)"
    }
  ],
  "title": "SEIL series fail to restrict access permissions"
}

JVNDB-2011-000014

Vulnerability from jvndb - Published: 2011-02-28 17:17 - Updated:2011-02-28 17:17

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000014.html",
  "dc:date": "2011-02-28T17:17+09:00",
  "dcterms:issued": "2011-02-28T17:17+09:00",
  "dcterms:modified": "2011-02-28T17:17+09:00",
  "description": "SEIL Series routers contain a buffer overflow vulnerability.\r\n\r\nThe PPP Access Concentrator (PPPAC) contained in SEIL Series routers contain a buffer overflow vulnerability when processing PPPoE packets.",
  "link": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000014.html",
  "sec:cpe": [
    {
      "#text": "cpe:/o:iij:seil%252fb1_firmware",
      "@product": "SEIL/B1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fneu_2fe_plus_firmware",
      "@product": "SEIL/neu 2FE Plus firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fturbo_firmware",
      "@product": "SEIL/Turbo firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx1_firmware",
      "@product": "SEIL/X1 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx2_firmware",
      "@product": "SEIL/X2 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/o:iij:seil%252fx86_firmware",
      "@product": "SEIL/x86 firmware",
      "@vendor": "Internet Initiative Japan Inc.",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "8.3",
    "@severity": "High",
    "@type": "Base",
    "@vector": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2011-000014",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN88991166",
      "@id": "JVN#88991166",
      "@source": "JVN"
    },
    {
      "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0454",
      "@id": "CVE-2011-0454",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-0454",
      "@id": "CVE-2011-0454",
      "@source": "NVD"
    },
    {
      "#text": "http://www.ipa.go.jp/security/english/vuln/201102_SEIL_en.html",
      "@id": "Security Alert for Vulnerability in SEIL Series Products",
      "@source": "IPA SECURITY ALERTS"
    },
    {
      "#text": "http://secunia.com/advisories/43494",
      "@id": "SA43494",
      "@source": "SECUNIA"
    },
    {
      "#text": "http://www.securityfocus.com/bid/46598",
      "@id": "46598",
      "@source": "BID"
    },
    {
      "#text": "http://xforce.iss.net/xforce/xfdb/65672",
      "@id": "65672",
      "@source": "XF"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-119",
      "@title": "Buffer Errors(CWE-119)"
    }
  ],
  "title": "SEIL Series routers vulnerable to buffer overflow"
}