Search criteria
33 vulnerabilities found for seil\/b1 by iij
VAR-200912-0285
Vulnerability from variot - Updated: 2023-12-18 14:02The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack. As a result, the third party may gain access to the network. According the developer, when L2TP/IPsec is being used, the authentication challenges are protected by the encryption provided by IPsec, and therefore the probability of being affected by this issue are reduced. SEIL/B1 is prone to an authentication-bypass vulnerability affecting CHAP and MS-CHAP-V2 authentication. Versions prior to SEIL/B1 2.60 are vulnerable. ----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability intelligence source on the market.
Implement it through Secunia.
For more information visit: http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com
TITLE: SEIL Routers PPP Access Concentrator Replay Vulnerability
SECUNIA ADVISORY ID: SA37628
VERIFY ADVISORY: http://secunia.com/advisories/37628/
DESCRIPTION: A vulnerability has been reported in the SEIL B1 router, which can be exploited by malicious people to bypass certain security restrictions.
SOLUTION: Update to version 2.60.
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: SEIL: http://www.seil.jp/seilseries/security/2009/a00697.php
JVN: http://jvn.jp/en/jp/JVN49602378/index.html http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000079.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200912-0285",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.01"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "firmware 1.00 through 2.52"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/b1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.60"
}
],
"sources": [
{
"db": "BID",
"id": "37293"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000079"
},
{
"db": "NVD",
"id": "CVE-2009-4409"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-340"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:2.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:2.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2009-4409"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor",
"sources": [
{
"db": "BID",
"id": "37293"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-340"
}
],
"trust": 0.9
},
"cve": "CVE-2009-4409",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "High",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "None",
"baseScore": 2.6,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2009-000079",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Low",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2009-4409",
"trust": 1.0,
"value": "LOW"
},
{
"author": "IPA",
"id": "JVNDB-2009-000079",
"trust": 0.8,
"value": "Low"
},
{
"author": "CNNVD",
"id": "CNNVD-200912-340",
"trust": 0.6,
"value": "LOW"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-000079"
},
{
"db": "NVD",
"id": "CVE-2009-4409"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-340"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack. As a result, the third party may gain access to the network. According the developer, when L2TP/IPsec is being used, the authentication challenges are protected by the encryption provided by IPsec, and therefore the probability of being affected by this issue are reduced. SEIL/B1 is prone to an authentication-bypass vulnerability affecting CHAP and MS-CHAP-V2 authentication. \nVersions prior to SEIL/B1 2.60 are vulnerable. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management) \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers PPP Access Concentrator Replay Vulnerability\n\nSECUNIA ADVISORY ID:\nSA37628\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/37628/\n\nDESCRIPTION:\nA vulnerability has been reported in the SEIL B1 router, which can be\nexploited by malicious people to bypass certain security\nrestrictions. \n\nSOLUTION:\nUpdate to version 2.60. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nSEIL:\nhttp://www.seil.jp/seilseries/security/2009/a00697.php\n\nJVN:\nhttp://jvn.jp/en/jp/JVN49602378/index.html\nhttp://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000079.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2009-4409"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000079"
},
{
"db": "BID",
"id": "37293"
},
{
"db": "PACKETSTORM",
"id": "83650"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "JVN",
"id": "JVN49602378",
"trust": 2.8
},
{
"db": "BID",
"id": "37293",
"trust": 2.7
},
{
"db": "SECUNIA",
"id": "37628",
"trust": 2.7
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000079",
"trust": 2.5
},
{
"db": "OSVDB",
"id": "61118",
"trust": 2.4
},
{
"db": "NVD",
"id": "CVE-2009-4409",
"trust": 2.4
},
{
"db": "JVN",
"id": "JVN#49602378",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-200912-340",
"trust": 0.6
},
{
"db": "PACKETSTORM",
"id": "83650",
"trust": 0.1
}
],
"sources": [
{
"db": "BID",
"id": "37293"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000079"
},
{
"db": "PACKETSTORM",
"id": "83650"
},
{
"db": "NVD",
"id": "CVE-2009-4409"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-340"
}
]
},
"id": "VAR-200912-0285",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.46153846
},
"last_update_date": "2023-12-18T14:02:17.589000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "a00697.php",
"trust": 0.8,
"url": "http://www.seil.jp/seilseries/security/2009/a00697.php"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-000079"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-000079"
},
{
"db": "NVD",
"id": "CVE-2009-4409"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "http://jvn.jp/en/jp/jvn49602378/index.html"
},
{
"trust": 2.4,
"url": "http://www.osvdb.org/61118"
},
{
"trust": 2.4,
"url": "http://secunia.com/advisories/37628"
},
{
"trust": 2.4,
"url": "http://www.securityfocus.com/bid/37293"
},
{
"trust": 2.0,
"url": "http://www.seil.jp/seilseries/security/2009/a00697.php"
},
{
"trust": 1.6,
"url": "http://jvndb.jvn.jp/ja/contents/2009/jvndb-2009-000079.html"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4409"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-4409"
},
{
"trust": 0.3,
"url": "http://www.seil.jp/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/business_solutions/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://jvndb.jvn.jp/en/contents/2009/jvndb-2009-000079.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/37628/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "BID",
"id": "37293"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000079"
},
{
"db": "PACKETSTORM",
"id": "83650"
},
{
"db": "NVD",
"id": "CVE-2009-4409"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-340"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "BID",
"id": "37293"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000079"
},
{
"db": "PACKETSTORM",
"id": "83650"
},
{
"db": "NVD",
"id": "CVE-2009-4409"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-340"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2009-12-11T00:00:00",
"db": "BID",
"id": "37293"
},
{
"date": "2009-12-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-000079"
},
{
"date": "2009-12-10T08:24:04",
"db": "PACKETSTORM",
"id": "83650"
},
{
"date": "2009-12-23T21:30:00.313000",
"db": "NVD",
"id": "CVE-2009-4409"
},
{
"date": "2009-12-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200912-340"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2009-12-14T19:23:00",
"db": "BID",
"id": "37293"
},
{
"date": "2009-12-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-000079"
},
{
"date": "2010-01-06T05:00:00",
"db": "NVD",
"id": "CVE-2009-4409"
},
{
"date": "2009-12-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200912-340"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200912-340"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL/B1 authentication issue",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-000079"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200912-340"
}
],
"trust": 0.6
}
}
VAR-201103-0115
Vulnerability from variot - Updated: 2023-12-18 13:49Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet. SEIL Series routers contain a buffer overflow vulnerability. Accoding to the developer, all versions of SEIL/86, SEIL/B1, SEIL/X1, SEIL/X2 3.00 through 3.11 process PPPoE packets in a non-administrative mode of operation, therefore the affect of this vulnerability is limited to the PPPAC service being stopped. A security vulnerability exists in the SEIL router that allows malicious users to compromise the target system. Sending a specially crafted message can execute arbitrary code in the context of the application. Multiple SEIL products, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow vulnerability. Failed exploit attempts will result in a denial-of-service condition. SEIL Router is a router produced by Japanese SEIL manufacturer. ----------------------------------------------------------------------
Meet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March).
http://secunia.com/company/events/mms_2011/
TITLE: SEIL Routers PPP Access Concentrator Buffer Overflow Vulnerability
SECUNIA ADVISORY ID: SA43494
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43494/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43494
RELEASE DATE: 2011-03-18
DISCUSS ADVISORY: http://secunia.com/advisories/43494/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/43494/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=43494
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in SEIL Routers, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is reported in the following products: * SEIL/x86 firmware 1.00 to 1.61. * SEIL/B1 firmware 1.00 to 3.11. * SEIL/X1 firmware 1.00 to 3.11. * SEIL/X2 firmware 1.00 to 3.11. * SEIL/Turbo firmware 1.80 to 2.10.
SOLUTION: Update to a patched version.
Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: http://www.seil.jp/support/security/a01001.html
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201103-0115",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.82"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.04"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.80"
},
{
"model": "seil\\/x86",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.81"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "3.10"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.84"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "3.11"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "3.01"
},
{
"model": "seil\\/x86",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.61"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.40"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.10"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.74"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.10"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.03"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.61"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.11"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.75"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.03"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.80"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.60"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.01"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.73"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.02"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.91"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.02"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.08"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.92"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.90"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.11"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.30"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.07"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.82"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.10"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.72"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.62"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.04"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.06"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.73"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.02"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.99"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.70"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.91"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.21"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.02"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.06"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.32"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.96"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.92"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.43"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.07"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.44"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.63"
},
{
"model": "seil\\/x86",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.20"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.31"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.75"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.72"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.95"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.74"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.41"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.61"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.83"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.81"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.40"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.95"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.11"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.94"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.60"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.01"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.01"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.85"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.99"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.96"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.32"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.10"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.93"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.00"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.62"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.20"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.31"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.09"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.98"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.73"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.02"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.05"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.70"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.11"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.22"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.30"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.74"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.83"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.41"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.61"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.63"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.94"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.01"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.60"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.84"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.85"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.62"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.93"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.00"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.09"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.70"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.75"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.98"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.21"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.43"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.05"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.01"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.44"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.63"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.22"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.08"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.72"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.90"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "turbo",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "1.80"
},
{
"model": "turbo",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "2.10"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "1.61"
},
{
"model": "neu 2fe plus",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "1.80"
},
{
"model": "neu 2fe plus",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "2.10"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 3.11"
},
{
"model": "seil/neu 2fe plus",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.80 to 2.10"
},
{
"model": "seil/turbo",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.80 to 2.10"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 3.11"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 3.11"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 1.61"
},
{
"model": "turbo",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.11"
},
{
"model": "seil/x2",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "seil/x1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "seil/b1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "neu 2fe plus",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.11"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2011-0817"
},
{
"db": "BID",
"id": "46598"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000014"
},
{
"db": "NVD",
"id": "CVE-2011-0454"
},
{
"db": "CNNVD",
"id": "CNNVD-201103-009"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:3.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.73:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.74:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:3.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:3.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:3.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.73:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.74:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.74:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.73:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:3.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:3.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x86_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x86_firmware:1.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.85:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.98:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.99:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.08:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.81:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.82:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.93:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.94:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.09:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.83:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.84:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.95:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.96:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.81:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.93:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.94:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.84:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.85:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.98:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.99:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.82:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.83:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.95:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.96:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.08:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.09:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2011-0454"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor",
"sources": [
{
"db": "BID",
"id": "46598"
}
],
"trust": 0.3
},
"cve": "CVE-2011-0454",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 6.5,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Adjacent Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Complete",
"baseScore": 8.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "JVNDB-2011-000014",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 6.5,
"id": "VHN-48399",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:A/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2011-0454",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2011-000014",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201103-009",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-48399",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-48399"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000014"
},
{
"db": "NVD",
"id": "CVE-2011-0454"
},
{
"db": "CNNVD",
"id": "CNNVD-201103-009"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet. SEIL Series routers contain a buffer overflow vulnerability. Accoding to the developer, all versions of SEIL/86, SEIL/B1, SEIL/X1, SEIL/X2 3.00 through 3.11 process PPPoE packets in a non-administrative mode of operation, therefore the affect of this vulnerability is limited to the PPPAC service being stopped. A security vulnerability exists in the SEIL router that allows malicious users to compromise the target system. Sending a specially crafted message can execute arbitrary code in the context of the application. Multiple SEIL products, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow vulnerability. Failed exploit attempts will result in a denial-of-service condition. SEIL Router is a router produced by Japanese SEIL manufacturer. ----------------------------------------------------------------------\n\n\nMeet Secunia @ Microsoft Management Summit (MMS) in Las Vegas, USA (21-25 March). \n\nhttp://secunia.com/company/events/mms_2011/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers PPP Access Concentrator Buffer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA43494\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/43494/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43494\n\nRELEASE DATE:\n2011-03-18\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/43494/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/43494/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43494\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in SEIL Routers, which can be\nexploited by malicious people to compromise a vulnerable system. \n\nThe vulnerability is reported in the following products:\n* SEIL/x86 firmware 1.00 to 1.61. \n* SEIL/B1 firmware 1.00 to 3.11. \n* SEIL/X1 firmware 1.00 to 3.11. \n* SEIL/X2 firmware 1.00 to 3.11. \n* SEIL/Turbo firmware 1.80 to 2.10. \n\nSOLUTION:\nUpdate to a patched version. \n\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.seil.jp/support/security/a01001.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2011-0454"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000014"
},
{
"db": "CNVD",
"id": "CNVD-2011-0817"
},
{
"db": "BID",
"id": "46598"
},
{
"db": "VULHUB",
"id": "VHN-48399"
},
{
"db": "PACKETSTORM",
"id": "99440"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "JVN",
"id": "JVN88991166",
"trust": 3.4
},
{
"db": "NVD",
"id": "CVE-2011-0454",
"trust": 3.4
},
{
"db": "SECUNIA",
"id": "43494",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000014",
"trust": 2.5
},
{
"db": "BID",
"id": "46598",
"trust": 2.2
},
{
"db": "XF",
"id": "65672",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201103-009",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2011-0817",
"trust": 0.6
},
{
"db": "JVN",
"id": "JVN#88991166",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-48399",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "99440",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2011-0817"
},
{
"db": "VULHUB",
"id": "VHN-48399"
},
{
"db": "BID",
"id": "46598"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000014"
},
{
"db": "PACKETSTORM",
"id": "99440"
},
{
"db": "NVD",
"id": "CVE-2011-0454"
},
{
"db": "CNNVD",
"id": "CNNVD-201103-009"
}
]
},
"id": "VAR-201103-0115",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2011-0817"
},
{
"db": "VULHUB",
"id": "VHN-48399"
}
],
"trust": 1.2042633255555555
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2011-0817"
}
]
},
"last_update_date": "2023-12-18T13:49:15.771000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "a01001(Japanese)",
"trust": 0.8,
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"title": "Patch for SEIL Multiple Products PPP Access Concentrator (PPPAC) Buffer Overflow Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/3112"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2011-0817"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000014"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-48399"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000014"
},
{
"db": "NVD",
"id": "CVE-2011-0454"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "http://secunia.com/advisories/43494"
},
{
"trust": 1.9,
"url": "http://www.securityfocus.com/bid/46598"
},
{
"trust": 1.8,
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"trust": 1.7,
"url": "http://jvn.jp/en/jp/jvn88991166/index.html"
},
{
"trust": 1.7,
"url": "http://jvndb.jvn.jp/jvndb/jvndb-2011-000014"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0454"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/english/vuln/201102_seil_en.html"
},
{
"trust": 0.8,
"url": "http://xforce.iss.net/xforce/xfdb/65672"
},
{
"trust": 0.8,
"url": "http://jvn.jp/en/jp/jvn88991166"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0454"
},
{
"trust": 0.6,
"url": "http://jvn.jp/jp/jvn88991166/index.htmlhttp"
},
{
"trust": 0.3,
"url": "http://jvn.jp/jp/jvn88991166/index.html"
},
{
"trust": 0.3,
"url": "http://www.seil.jp/"
},
{
"trust": 0.3,
"url": "http://www.seil.jp/download/firmware/"
},
{
"trust": 0.1,
"url": "http://secunia.com/products/corporate/evm/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
},
{
"trust": 0.1,
"url": "http://secunia.com/company/events/mms_2011/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/43494/#comments"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/personal/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43494"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/43494/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2011-0817"
},
{
"db": "VULHUB",
"id": "VHN-48399"
},
{
"db": "BID",
"id": "46598"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000014"
},
{
"db": "PACKETSTORM",
"id": "99440"
},
{
"db": "NVD",
"id": "CVE-2011-0454"
},
{
"db": "CNNVD",
"id": "CNNVD-201103-009"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2011-0817"
},
{
"db": "VULHUB",
"id": "VHN-48399"
},
{
"db": "BID",
"id": "46598"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-000014"
},
{
"db": "PACKETSTORM",
"id": "99440"
},
{
"db": "NVD",
"id": "CVE-2011-0454"
},
{
"db": "CNNVD",
"id": "CNNVD-201103-009"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-03-01T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-0817"
},
{
"date": "2011-03-01T00:00:00",
"db": "VULHUB",
"id": "VHN-48399"
},
{
"date": "2011-02-28T00:00:00",
"db": "BID",
"id": "46598"
},
{
"date": "2011-02-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-000014"
},
{
"date": "2011-03-18T07:48:13",
"db": "PACKETSTORM",
"id": "99440"
},
{
"date": "2011-03-01T23:00:02.800000",
"db": "NVD",
"id": "CVE-2011-0454"
},
{
"date": "2011-03-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201103-009"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-03-01T00:00:00",
"db": "CNVD",
"id": "CNVD-2011-0817"
},
{
"date": "2017-08-17T00:00:00",
"db": "VULHUB",
"id": "VHN-48399"
},
{
"date": "2011-02-28T00:00:00",
"db": "BID",
"id": "46598"
},
{
"date": "2011-02-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-000014"
},
{
"date": "2017-08-17T01:33:30.930000",
"db": "NVD",
"id": "CVE-2011-0454"
},
{
"date": "2011-03-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201103-009"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "specific network environment",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201103-009"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL Multiple Products PPP Access Concentrator (PPPAC) Buffer Overflow Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2011-0817"
},
{
"db": "BID",
"id": "46598"
}
],
"trust": 0.9
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201103-009"
}
],
"trust": 0.6
}
}
VAR-200912-0195
Vulnerability from variot - Updated: 2023-12-18 13:30Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets. SEIL/X Series and SEIL/B1 contain a denial of service (DoS) vulnerability. SEIL/X Series and SEIL/B1 are routers. Successfully exploiting these issues allows remote attackers to execute arbitrary code with administrative privileges or crash the affected device, denying service to legitimate users. The following devices are affected: SEIL/X1 2.40 to 2.51 SEIL/X2 2.40 to 2.51 SEIL/B1 2.40 to 2.51. ----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability intelligence source on the market.
Implement it through Secunia.
For more information visit: http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com
TITLE: SEIL Routers Denial of Service and Buffer Overflow Vulnerabilities
SECUNIA ADVISORY ID: SA37154
VERIFY ADVISORY: http://secunia.com/advisories/37154/
DESCRIPTION: Some vulnerabilities have been reported in the SEIL/X1, X2, and B1 routers, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.
1) An error exists when processing of certain GRE packets.
Note: Successful exploitation requires that the NAT functionality is enabled.
2) A buffer overflow error exists within the URL filtering functionality. This can be exploited to cause a buffer overflow and potentially execute arbitrary code by tricking a user into visiting a specially crafted website.
Vulnerability #1 is reported in SEIL/X1, X2, and B1 version 2.30 to 2.51 and vulnerability #2 is reported in SEIL/X1, X2, and B1 version 2.40 to 2.51.
SOLUTION: Update to version 2.52.
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: 1) http://jvn.jp/jp/JVN13011682/index.html http://www.seil.jp/seilseries/security/2009/a00674.php
2) http://jvn.jp/jp/JVN06362164/index.html http://www.seil.jp/seilseries/security/2009/a00669.php
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200912-0195",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "firmware 2.30 to 2.51"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "firmware 2.30 to 2.51"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "firmware 2.30 to 2.51"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.49"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.47"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.46"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.45"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.44"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.43"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.42"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.41"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.40"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.49"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.47"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.46"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.45"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.44"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.43"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.42"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.41"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.40"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x2",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/x1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/b1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
}
],
"sources": [
{
"db": "BID",
"id": "36896"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000070"
},
{
"db": "NVD",
"id": "CVE-2009-4293"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-157"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2009-4293"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "JPCERT/CC",
"sources": [
{
"db": "BID",
"id": "36896"
}
],
"trust": 0.3
},
"cve": "CVE-2009-4293",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Complete",
"baseScore": 7.8,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2009-000070",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-41739",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2009-4293",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2009-000070",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-200912-157",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-41739",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-41739"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000070"
},
{
"db": "NVD",
"id": "CVE-2009-4293"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-157"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets. SEIL/X Series and SEIL/B1 contain a denial of service (DoS) vulnerability. SEIL/X Series and SEIL/B1 are routers. \nSuccessfully exploiting these issues allows remote attackers to execute arbitrary code with administrative privileges or crash the affected device, denying service to legitimate users. \nThe following devices are affected:\nSEIL/X1 2.40 to 2.51\nSEIL/X2 2.40 to 2.51\nSEIL/B1 2.40 to 2.51. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management) \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers Denial of Service and Buffer Overflow Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA37154\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/37154/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in the SEIL/X1, X2, and B1\nrouters, which can be exploited by malicious people to cause a DoS\n(Denial of Service) and compromise a vulnerable system. \n\n1) An error exists when processing of certain GRE packets. \n\nNote: Successful exploitation requires that the NAT functionality is\nenabled. \n\n2) A buffer overflow error exists within the URL filtering\nfunctionality. This can be exploited to cause a buffer overflow and\npotentially execute arbitrary code by tricking a user into visiting a\nspecially crafted website. \n\nVulnerability #1 is reported in SEIL/X1, X2, and B1 version 2.30 to\n2.51 and vulnerability #2 is reported in SEIL/X1, X2, and B1 version\n2.40 to 2.51. \n\nSOLUTION:\nUpdate to version 2.52. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\n1) http://jvn.jp/jp/JVN13011682/index.html\nhttp://www.seil.jp/seilseries/security/2009/a00674.php\n\n2) http://jvn.jp/jp/JVN06362164/index.html\nhttp://www.seil.jp/seilseries/security/2009/a00669.php\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2009-4293"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000070"
},
{
"db": "BID",
"id": "36896"
},
{
"db": "VULHUB",
"id": "VHN-41739"
},
{
"db": "PACKETSTORM",
"id": "82299"
}
],
"trust": 2.07
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "JVN",
"id": "JVN13011682",
"trust": 2.9
},
{
"db": "NVD",
"id": "CVE-2009-4293",
"trust": 2.8
},
{
"db": "SECUNIA",
"id": "37154",
"trust": 2.7
},
{
"db": "OSVDB",
"id": "59361",
"trust": 2.5
},
{
"db": "VUPEN",
"id": "ADV-2009-3111",
"trust": 2.5
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000070",
"trust": 2.5
},
{
"db": "XF",
"id": "54050",
"trust": 1.4
},
{
"db": "CNNVD",
"id": "CNNVD-200912-157",
"trust": 0.7
},
{
"db": "JVN",
"id": "JVN#13011682",
"trust": 0.6
},
{
"db": "JVN",
"id": "JVN06362164",
"trust": 0.4
},
{
"db": "BID",
"id": "36896",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-41739",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "82299",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-41739"
},
{
"db": "BID",
"id": "36896"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000070"
},
{
"db": "PACKETSTORM",
"id": "82299"
},
{
"db": "NVD",
"id": "CVE-2009-4293"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-157"
}
]
},
"id": "VAR-200912-0195",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-41739"
}
],
"trust": 0.5871794866666666
},
"last_update_date": "2023-12-18T13:30:13.771000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "a00674.php",
"trust": 0.8,
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-000070"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-16",
"trust": 1.1
},
{
"problemtype": "CWE-20",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-41739"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000070"
},
{
"db": "NVD",
"id": "CVE-2009-4293"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "http://jvn.jp/en/jp/jvn13011682/index.html"
},
{
"trust": 2.5,
"url": "http://osvdb.org/59361"
},
{
"trust": 2.5,
"url": "http://secunia.com/advisories/37154"
},
{
"trust": 2.5,
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"trust": 2.1,
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"trust": 1.7,
"url": "http://jvndb.jvn.jp/en/contents/2009/jvndb-2009-000070.html"
},
{
"trust": 1.4,
"url": "http://xforce.iss.net/xforce/xfdb/54050"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4293"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-4293"
},
{
"trust": 0.4,
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"trust": 0.3,
"url": "http://jvn.jp/en/jp/jvn06362164/index.html"
},
{
"trust": 0.3,
"url": "http://www.seil.jp/"
},
{
"trust": 0.1,
"url": "http://jvn.jp/jp/jvn13011682/index.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://jvn.jp/jp/jvn06362164/index.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/business_solutions/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/37154/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-41739"
},
{
"db": "BID",
"id": "36896"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000070"
},
{
"db": "PACKETSTORM",
"id": "82299"
},
{
"db": "NVD",
"id": "CVE-2009-4293"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-157"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-41739"
},
{
"db": "BID",
"id": "36896"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000070"
},
{
"db": "PACKETSTORM",
"id": "82299"
},
{
"db": "NVD",
"id": "CVE-2009-4293"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-157"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2009-12-10T00:00:00",
"db": "VULHUB",
"id": "VHN-41739"
},
{
"date": "2009-11-02T00:00:00",
"db": "BID",
"id": "36896"
},
{
"date": "2009-11-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-000070"
},
{
"date": "2009-10-28T10:48:16",
"db": "PACKETSTORM",
"id": "82299"
},
{
"date": "2009-12-10T23:30:00.420000",
"db": "NVD",
"id": "CVE-2009-4293"
},
{
"date": "2009-12-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200912-157"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-17T00:00:00",
"db": "VULHUB",
"id": "VHN-41739"
},
{
"date": "2010-08-11T11:34:00",
"db": "BID",
"id": "36896"
},
{
"date": "2009-11-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-000070"
},
{
"date": "2017-08-17T01:31:31.773000",
"db": "NVD",
"id": "CVE-2009-4293"
},
{
"date": "2009-12-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200912-157"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200912-157"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL/X Series and SEIL/B1 denial of service vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-000070"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "configuration error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200912-157"
}
],
"trust": 0.6
}
}
VAR-200912-0194
Vulnerability from variot - Updated: 2023-12-18 13:30Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors. SEIL/X Series and SEIL/B1 contain a buffer overflow vulnerability. SEIL/X Series and SEIL/B1 are routers. The following devices are affected: SEIL/X1 2.40 to 2.51 SEIL/X2 2.40 to 2.51 SEIL/B1 2.40 to 2.51. ----------------------------------------------------------------------
Do you have VARM strategy implemented?
(Vulnerability Assessment Remediation Management)
If not, then implement it through the most reliable vulnerability intelligence source on the market.
Implement it through Secunia.
For more information visit: http://secunia.com/advisories/business_solutions/
Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com
TITLE: SEIL Routers Denial of Service and Buffer Overflow Vulnerabilities
SECUNIA ADVISORY ID: SA37154
VERIFY ADVISORY: http://secunia.com/advisories/37154/
DESCRIPTION: Some vulnerabilities have been reported in the SEIL/X1, X2, and B1 routers, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.
1) An error exists when processing of certain GRE packets. This can be exploited to cause the device to restart by sending certain specially crafted GRE packets.
Note: Successful exploitation requires that the NAT functionality is enabled.
2) A buffer overflow error exists within the URL filtering functionality.
Vulnerability #1 is reported in SEIL/X1, X2, and B1 version 2.30 to 2.51 and vulnerability #2 is reported in SEIL/X1, X2, and B1 version 2.40 to 2.51.
SOLUTION: Update to version 2.52.
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: 1) http://jvn.jp/jp/JVN13011682/index.html http://www.seil.jp/seilseries/security/2009/a00674.php
2) http://jvn.jp/jp/JVN06362164/index.html http://www.seil.jp/seilseries/security/2009/a00669.php
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-200912-0194",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "firmware 2.40 to 2.51"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "firmware 2.40 to 2.51"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "firmware 2.40 to 2.51"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.49"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.47"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.46"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.45"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.44"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.43"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.42"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.41"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.40"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.49"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.47"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.46"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.45"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.44"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.43"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.42"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.41"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.40"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x2",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/x1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/b1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
}
],
"sources": [
{
"db": "BID",
"id": "36896"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000069"
},
{
"db": "NVD",
"id": "CVE-2009-4292"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-156"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2009-4292"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "JPCERT/CC",
"sources": [
{
"db": "BID",
"id": "36896"
}
],
"trust": 0.3
},
"cve": "CVE-2009-4292",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Complete",
"baseScore": 9.3,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "JVNDB-2009-000069",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.6,
"id": "VHN-41738",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2009-4292",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2009-000069",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-200912-156",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-41738",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-41738"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000069"
},
{
"db": "NVD",
"id": "CVE-2009-4292"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-156"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors. SEIL/X Series and SEIL/B1 contain a buffer overflow vulnerability. SEIL/X Series and SEIL/B1 are routers. \nThe following devices are affected:\nSEIL/X1 2.40 to 2.51\nSEIL/X2 2.40 to 2.51\nSEIL/B1 2.40 to 2.51. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management) \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers Denial of Service and Buffer Overflow Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA37154\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/37154/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in the SEIL/X1, X2, and B1\nrouters, which can be exploited by malicious people to cause a DoS\n(Denial of Service) and compromise a vulnerable system. \n\n1) An error exists when processing of certain GRE packets. This can\nbe exploited to cause the device to restart by sending certain\nspecially crafted GRE packets. \n\nNote: Successful exploitation requires that the NAT functionality is\nenabled. \n\n2) A buffer overflow error exists within the URL filtering\nfunctionality. \n\nVulnerability #1 is reported in SEIL/X1, X2, and B1 version 2.30 to\n2.51 and vulnerability #2 is reported in SEIL/X1, X2, and B1 version\n2.40 to 2.51. \n\nSOLUTION:\nUpdate to version 2.52. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\n1) http://jvn.jp/jp/JVN13011682/index.html\nhttp://www.seil.jp/seilseries/security/2009/a00674.php\n\n2) http://jvn.jp/jp/JVN06362164/index.html\nhttp://www.seil.jp/seilseries/security/2009/a00669.php\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2009-4292"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000069"
},
{
"db": "BID",
"id": "36896"
},
{
"db": "VULHUB",
"id": "VHN-41738"
},
{
"db": "PACKETSTORM",
"id": "82299"
}
],
"trust": 2.07
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "JVN",
"id": "JVN06362164",
"trust": 2.9
},
{
"db": "NVD",
"id": "CVE-2009-4292",
"trust": 2.8
},
{
"db": "SECUNIA",
"id": "37154",
"trust": 2.7
},
{
"db": "VUPEN",
"id": "ADV-2009-3111",
"trust": 2.5
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000069",
"trust": 2.5
},
{
"db": "OSVDB",
"id": "59362",
"trust": 1.7
},
{
"db": "XF",
"id": "54050",
"trust": 0.8
},
{
"db": "OSVDB",
"id": "59361",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200912-156",
"trust": 0.7
},
{
"db": "JVN",
"id": "JVN#06362164",
"trust": 0.6
},
{
"db": "XF",
"id": "54051",
"trust": 0.6
},
{
"db": "JVN",
"id": "JVN13011682",
"trust": 0.4
},
{
"db": "BID",
"id": "36896",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-41738",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "82299",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-41738"
},
{
"db": "BID",
"id": "36896"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000069"
},
{
"db": "PACKETSTORM",
"id": "82299"
},
{
"db": "NVD",
"id": "CVE-2009-4292"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-156"
}
]
},
"id": "VAR-200912-0194",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-41738"
}
],
"trust": 0.5871794866666666
},
"last_update_date": "2023-12-18T13:30:13.735000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "a00669.php",
"trust": 0.8,
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-000069"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-41738"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000069"
},
{
"db": "NVD",
"id": "CVE-2009-4292"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "http://jvn.jp/en/jp/jvn06362164/index.html"
},
{
"trust": 2.5,
"url": "http://secunia.com/advisories/37154"
},
{
"trust": 2.5,
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"trust": 2.1,
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"trust": 1.7,
"url": "http://jvndb.jvn.jp/en/contents/2009/jvndb-2009-000069.html"
},
{
"trust": 1.7,
"url": "http://osvdb.org/59362"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-4292"
},
{
"trust": 0.8,
"url": "http://xforce.iss.net/xforce/xfdb/54050"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-4292"
},
{
"trust": 0.8,
"url": "http://osvdb.org/59361"
},
{
"trust": 0.6,
"url": "http://xforce.iss.net/xforce/xfdb/54051"
},
{
"trust": 0.4,
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"trust": 0.3,
"url": "http://jvn.jp/en/jp/jvn13011682/index.html"
},
{
"trust": 0.3,
"url": "http://www.seil.jp/"
},
{
"trust": 0.1,
"url": "http://jvn.jp/jp/jvn13011682/index.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://jvn.jp/jp/jvn06362164/index.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/business_solutions/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/37154/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-41738"
},
{
"db": "BID",
"id": "36896"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000069"
},
{
"db": "PACKETSTORM",
"id": "82299"
},
{
"db": "NVD",
"id": "CVE-2009-4292"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-156"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-41738"
},
{
"db": "BID",
"id": "36896"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-000069"
},
{
"db": "PACKETSTORM",
"id": "82299"
},
{
"db": "NVD",
"id": "CVE-2009-4292"
},
{
"db": "CNNVD",
"id": "CNNVD-200912-156"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2009-12-10T00:00:00",
"db": "VULHUB",
"id": "VHN-41738"
},
{
"date": "2009-11-02T00:00:00",
"db": "BID",
"id": "36896"
},
{
"date": "2009-11-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-000069"
},
{
"date": "2009-10-28T10:48:16",
"db": "PACKETSTORM",
"id": "82299"
},
{
"date": "2009-12-10T23:30:00.390000",
"db": "NVD",
"id": "CVE-2009-4292"
},
{
"date": "2009-12-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200912-156"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-17T00:00:00",
"db": "VULHUB",
"id": "VHN-41738"
},
{
"date": "2010-08-11T11:34:00",
"db": "BID",
"id": "36896"
},
{
"date": "2009-11-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-000069"
},
{
"date": "2017-08-17T01:31:31.693000",
"db": "NVD",
"id": "CVE-2009-4292"
},
{
"date": "2009-12-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200912-156"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200912-156"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL/X Series and SEIL/B1 buffer overflow vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-000069"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200912-156"
}
],
"trust": 0.6
}
}
VAR-201310-0458
Vulnerability from variot - Updated: 2023-12-18 13:29The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic. SEIL Series routers contain a vulnerability in RADIUS authentication. SEIL/Turbo and SEIL/neu 2FE Plus routers are router devices developed by SEIL. Multiple SEIL products are prone to a security weakness. Attackers can leverage this issue to bypass certain security restrictions. This may aid in further attacks. The following products are vulnerable: SEIL/x86 1.00 through 2.81 SEIL/X1 1.00 through 4.31 SEIL/X2 1.00 through 4.31 SEIL/B1 1.00 through 4.31 SEIL/Turbo 2.05 through 2.15 SEIL/neu 2FE Plus 2.05 through 2.15. SEIL/x86, etc. SEIL/x86 due to the fact that the program generates predictable random numbers. SEIL/x86 Versions 1.00 to 2.80, SEIL/X1 Versions 1.00 to 4.30, SEIL/X2 Versions 1.00 to 4.30, SEIL/B1 Versions 1.00 to 4.30, SEIL/Turbo Versions 1.80 to 2.15, and SEIL/neu 2FE Plus versions 1.80 to 2.15
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201310-0458",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "seil\\%2fneu 2fe plus",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.80"
},
{
"model": "seil\\%2fneu 2fe plus",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.15"
},
{
"model": "seil\\%2fb1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\%2fx86",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\%2fturbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.80"
},
{
"model": "seil\\%2fneu 2fe plus",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.05"
},
{
"model": "seil\\%2fb1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "4.30"
},
{
"model": "seil\\%2fturbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.15"
},
{
"model": "seil\\%2fturbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.05"
},
{
"model": "seil\\%2fx86",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.80"
},
{
"model": "seil\\%2fx1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\%2fx1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.30"
},
{
"model": "seil\\%2fx2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.30"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x86",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\%2fx2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil/neu 2fe plus",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "1.80"
},
{
"model": "seil/turbo",
"scope": "eq",
"trust": 0.9,
"vendor": "seil",
"version": "1.80"
},
{
"model": "seil/b1",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 4.30"
},
{
"model": "seil/neu 2fe plus",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/neu 2fe plus",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.80 to 2.15"
},
{
"model": "seil/turbo",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/turbo",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.80 to 2.15"
},
{
"model": "seil/x1",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 4.30"
},
{
"model": "seil/x2",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 4.30"
},
{
"model": "seil/x86",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 2.80"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.60"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.30"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.45"
},
{
"model": "seil/x86",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.81"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.42"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.30"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.49"
},
{
"model": "seil/neu 2fe plus",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.16"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.41"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.40"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.47"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.44"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.45"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.61"
},
{
"model": "seil/turbo",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.15"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.35"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.42"
},
{
"model": "seil/x1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "4.31"
},
{
"model": "seil/b1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "4.31"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.46"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.43"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.30"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.47"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.41"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.40"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/turbo",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.16"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.44"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/x2",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "4.31"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.80"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.49"
},
{
"model": "seil/neu 2fe plus",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.15"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.46"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.43"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13386"
},
{
"db": "BID",
"id": "62612"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000091"
},
{
"db": "NVD",
"id": "CVE-2013-4708"
},
{
"db": "CNNVD",
"id": "CNNVD-201309-504"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx2_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx2_firmware:4.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:1.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-4708"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "62612"
}
],
"trust": 0.3
},
"cve": "CVE-2013-4708",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 4.9,
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "High",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "None",
"baseScore": 4.0,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2013-000091",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CNVD-2013-13386",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 4.9,
"id": "VHN-64710",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:H/AU:N/C:P/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-4708",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "IPA",
"id": "JVNDB-2013-000091",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2013-13386",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201309-504",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-64710",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13386"
},
{
"db": "VULHUB",
"id": "VHN-64710"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000091"
},
{
"db": "NVD",
"id": "CVE-2013-4708"
},
{
"db": "CNNVD",
"id": "CNNVD-201309-504"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic. SEIL Series routers contain a vulnerability in RADIUS authentication. SEIL/Turbo and SEIL/neu 2FE Plus routers are router devices developed by SEIL. Multiple SEIL products are prone to a security weakness. \nAttackers can leverage this issue to bypass certain security restrictions. This may aid in further attacks. \nThe following products are vulnerable:\nSEIL/x86 1.00 through 2.81\nSEIL/X1 1.00 through 4.31\nSEIL/X2 1.00 through 4.31\nSEIL/B1 1.00 through 4.31\nSEIL/Turbo 2.05 through 2.15\nSEIL/neu 2FE Plus 2.05 through 2.15. SEIL/x86, etc. SEIL/x86 due to the fact that the program generates predictable random numbers. SEIL/x86 Versions 1.00 to 2.80, SEIL/X1 Versions 1.00 to 4.30, SEIL/X2 Versions 1.00 to 4.30, SEIL/B1 Versions 1.00 to 4.30, SEIL/Turbo Versions 1.80 to 2.15, and SEIL/neu 2FE Plus versions 1.80 to 2.15",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-4708"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000091"
},
{
"db": "CNVD",
"id": "CNVD-2013-13386"
},
{
"db": "BID",
"id": "62612"
},
{
"db": "VULHUB",
"id": "VHN-64710"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-4708",
"trust": 3.4
},
{
"db": "JVN",
"id": "JVN40079308",
"trust": 2.8
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000091",
"trust": 2.5
},
{
"db": "OSVDB",
"id": "97619",
"trust": 1.7
},
{
"db": "BID",
"id": "62612",
"trust": 1.6
},
{
"db": "CNNVD",
"id": "CNNVD-201309-504",
"trust": 0.7
},
{
"db": "SECUNIA",
"id": "54818",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2013-13386",
"trust": 0.6
},
{
"db": "JVN",
"id": "JVN#40079308",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-64710",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13386"
},
{
"db": "VULHUB",
"id": "VHN-64710"
},
{
"db": "BID",
"id": "62612"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000091"
},
{
"db": "NVD",
"id": "CVE-2013-4708"
},
{
"db": "CNNVD",
"id": "CNNVD-201309-504"
}
]
},
"id": "VAR-201310-0458",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13386"
},
{
"db": "VULHUB",
"id": "VHN-64710"
}
],
"trust": 1.2519099900000001
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13386"
}
]
},
"last_update_date": "2023-12-18T13:29:52.352000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Internet Initiative Japan Inc. website",
"trust": 0.8,
"url": "http://www.seil.jp/support/security/a01388.html"
},
{
"title": "SEIL Multiple Products RADIUS Verification Random Number Generation Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/39884"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13386"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000091"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-310",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-64710"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000091"
},
{
"db": "NVD",
"id": "CVE-2013-4708"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://www.seil.jp/support/security/a01388.html"
},
{
"trust": 1.7,
"url": "http://jvn.jp/en/jp/jvn40079308/index.html"
},
{
"trust": 1.7,
"url": "http://jvndb.jvn.jp/ja/contents/2013/jvndb-2013-000091.html"
},
{
"trust": 1.7,
"url": "http://osvdb.org/97619"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4708"
},
{
"trust": 0.8,
"url": "https://jvn.jp/en/jp/jvn40079308/"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-4708"
},
{
"trust": 0.6,
"url": "http://www.secunia.com/advisories/54818/"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/62612"
},
{
"trust": 0.3,
"url": "http://jvn.jp/jp/jvn40079308/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13386"
},
{
"db": "VULHUB",
"id": "VHN-64710"
},
{
"db": "BID",
"id": "62612"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000091"
},
{
"db": "NVD",
"id": "CVE-2013-4708"
},
{
"db": "CNNVD",
"id": "CNNVD-201309-504"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2013-13386"
},
{
"db": "VULHUB",
"id": "VHN-64710"
},
{
"db": "BID",
"id": "62612"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000091"
},
{
"db": "NVD",
"id": "CVE-2013-4708"
},
{
"db": "CNNVD",
"id": "CNNVD-201309-504"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-09-29T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-13386"
},
{
"date": "2013-10-01T00:00:00",
"db": "VULHUB",
"id": "VHN-64710"
},
{
"date": "2013-09-20T00:00:00",
"db": "BID",
"id": "62612"
},
{
"date": "2013-09-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-000091"
},
{
"date": "2013-10-01T17:55:03.647000",
"db": "NVD",
"id": "CVE-2013-4708"
},
{
"date": "2013-09-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201309-504"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-09-29T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-13386"
},
{
"date": "2013-10-07T00:00:00",
"db": "VULHUB",
"id": "VHN-64710"
},
{
"date": "2013-09-20T00:00:00",
"db": "BID",
"id": "62612"
},
{
"date": "2013-10-08T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-000091"
},
{
"date": "2013-10-07T14:06:42.800000",
"db": "NVD",
"id": "CVE-2013-4708"
},
{
"date": "2014-06-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201309-504"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201309-504"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL Series routers vulnerable in RADIUS authentication",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-000091"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "encryption problem",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201309-504"
}
],
"trust": 0.6
}
}
VAR-201309-0394
Vulnerability from variot - Updated: 2023-12-18 13:14Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message. SEIL Series routers contain a buffer overflow vulnerability. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contains a buffer overflow vulnerability in processing L2TP messages.An attacker may execute an arbitrary code on the vulnerable system. The SEIL Router is a router from Japan's SEIL vendors. SEIL series routers, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow vulnerability because they fails to sufficiently bounds check user-supplied data Attackers can exploit this issue to execute arbitrary code in context of the affected device or cause denial-of-service conditions. SEIL/x86, etc. The following products and versions are affected: SEIL/x86 devices with firmware prior to 2.82, SEIL/X1 devices with firmware prior to 4.32, SEIL/X2 devices with firmware prior to 4.32, SEIL/B1 devices with firmware prior to 4.32 , SEIL/Turbo devices using firmware earlier than 2.16, and SEIL/neu 2FE Plus devices using firmware earlier than 2.16
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201309-0394",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "seil\\%2fneu 2fe plus",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.15"
},
{
"model": "seil\\%2fturbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.05"
},
{
"model": "seil\\%2fb1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil x2",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "4.31"
},
{
"model": "seil x2",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\%2fturbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.15"
},
{
"model": "seil\\%2fx86",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\%2fx86",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.81"
},
{
"model": "seil\\%2fneu 2fe plus",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.05"
},
{
"model": "seil\\%2fb1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "4.31"
},
{
"model": "seil\\%2fx1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\%2fx1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.31"
},
{
"model": "seil\\/x86",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil/b1",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 4.31"
},
{
"model": "seil/neu 2fe plus",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/neu 2fe plus",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "2.05 to 2.15"
},
{
"model": "seil/turbo",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/turbo",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "2.05 to 2.15"
},
{
"model": "seil/x1",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 4.31"
},
{
"model": "seil/x2",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 4.31"
},
{
"model": "seil/x86",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 2.81"
},
{
"model": "seil/neu 2fe plus to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "2.052.15"
},
{
"model": "seil/turbo to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "2.052.15"
},
{
"model": "seil/b1 to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.004.31"
},
{
"model": "seil/x2 to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.004.31"
},
{
"model": "seil/x1 to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.004.31"
},
{
"model": "seil/x86 to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.002.81"
},
{
"model": "neu 2fe plus",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.15"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.60"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.45"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.42"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.31"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.49"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.31"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.41"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.40"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.47"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.44"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.45"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.61"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "turbo",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.16"
},
{
"model": "turbo",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.10"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.35"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.42"
},
{
"model": "neu 2fe plus",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.10"
},
{
"model": "seil/x1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "4.32"
},
{
"model": "seil/b1",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "4.32"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "neu 2fe plus",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.16"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.11"
},
{
"model": "turbo",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.11"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.46"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.43"
},
{
"model": "turbo",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.05"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "neu 2fe plus",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.11"
},
{
"model": "neu 2fe plus",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.05"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.41"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.47"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.40"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.31"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.44"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/x86",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "2.82"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.49"
},
{
"model": "seil/x2",
"scope": "ne",
"trust": 0.3,
"vendor": "seil",
"version": "4.32"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.81"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.46"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.43"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "turbo",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.15"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13230"
},
{
"db": "BID",
"id": "62593"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000092"
},
{
"db": "NVD",
"id": "CVE-2013-4709"
},
{
"db": "CNNVD",
"id": "CNNVD-201309-351"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x2_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x2_firmware:4.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.81:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-4709"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "62593"
}
],
"trust": 0.3
},
"cve": "CVE-2013-4709",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Partial",
"baseScore": 7.5,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2013-000092",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2013-13230",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-64711",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-4709",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "IPA",
"id": "JVNDB-2013-000092",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2013-13230",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201309-351",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-64711",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13230"
},
{
"db": "VULHUB",
"id": "VHN-64711"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000092"
},
{
"db": "NVD",
"id": "CVE-2013-4709"
},
{
"db": "CNNVD",
"id": "CNNVD-201309-351"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message. SEIL Series routers contain a buffer overflow vulnerability. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contains a buffer overflow vulnerability in processing L2TP messages.An attacker may execute an arbitrary code on the vulnerable system. The SEIL Router is a router from Japan\u0027s SEIL vendors. SEIL series routers, including SEIL/x86, SEIL/B1, SEIL/X1, SEIL/X2, Turbo, and neu 2FE Plus are prone to a buffer-overflow vulnerability because they fails to sufficiently bounds check user-supplied data\nAttackers can exploit this issue to execute arbitrary code in context of the affected device or cause denial-of-service conditions. SEIL/x86, etc. The following products and versions are affected: SEIL/x86 devices with firmware prior to 2.82, SEIL/X1 devices with firmware prior to 4.32, SEIL/X2 devices with firmware prior to 4.32, SEIL/B1 devices with firmware prior to 4.32 , SEIL/Turbo devices using firmware earlier than 2.16, and SEIL/neu 2FE Plus devices using firmware earlier than 2.16",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-4709"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000092"
},
{
"db": "CNVD",
"id": "CNVD-2013-13230"
},
{
"db": "BID",
"id": "62593"
},
{
"db": "VULHUB",
"id": "VHN-64711"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-4709",
"trust": 3.4
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000092",
"trust": 2.8
},
{
"db": "JVN",
"id": "JVN43152129",
"trust": 2.8
},
{
"db": "CNNVD",
"id": "CNNVD-201309-351",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2013-13230",
"trust": 0.6
},
{
"db": "JVN",
"id": "JVN#43152129",
"trust": 0.6
},
{
"db": "BID",
"id": "62593",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-64711",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13230"
},
{
"db": "VULHUB",
"id": "VHN-64711"
},
{
"db": "BID",
"id": "62593"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000092"
},
{
"db": "NVD",
"id": "CVE-2013-4709"
},
{
"db": "CNNVD",
"id": "CNNVD-201309-351"
}
]
},
"id": "VAR-201309-0394",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13230"
},
{
"db": "VULHUB",
"id": "VHN-64711"
}
],
"trust": 1.1914468853333333
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13230"
}
]
},
"last_update_date": "2023-12-18T13:14:55.037000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Internet Initiative Japan Inc. website",
"trust": 0.8,
"url": "http://www.seil.jp/support/security/a01396.html"
},
{
"title": "Patch for SEIL Series Router PPPACL L2TP Message Processing Buffer Overflow Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/39771"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13230"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000092"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-64711"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000092"
},
{
"db": "NVD",
"id": "CVE-2013-4709"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://www.seil.jp/support/security/a01396.html"
},
{
"trust": 2.0,
"url": "http://jvn.jp/en/jp/jvn43152129/index.html"
},
{
"trust": 1.7,
"url": "http://jvndb.jvn.jp/jvndb/jvndb-2013-000092"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-4709"
},
{
"trust": 0.8,
"url": "https://jvn.jp/en/jp/jvn43152129/"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=http://support.apple.com/kb/cve-2013-4709"
},
{
"trust": 0.3,
"url": "http://www.seil.jp/"
},
{
"trust": 0.3,
"url": "http://www.seil.jp/download/firmware/"
},
{
"trust": 0.3,
"url": "http://jvndb.jvn.jp/en/contents/2013/jvndb-2013-000092.html"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2013-13230"
},
{
"db": "VULHUB",
"id": "VHN-64711"
},
{
"db": "BID",
"id": "62593"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000092"
},
{
"db": "NVD",
"id": "CVE-2013-4709"
},
{
"db": "CNNVD",
"id": "CNNVD-201309-351"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2013-13230"
},
{
"db": "VULHUB",
"id": "VHN-64711"
},
{
"db": "BID",
"id": "62593"
},
{
"db": "JVNDB",
"id": "JVNDB-2013-000092"
},
{
"db": "NVD",
"id": "CVE-2013-4709"
},
{
"db": "CNNVD",
"id": "CNNVD-201309-351"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-09-24T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-13230"
},
{
"date": "2013-09-20T00:00:00",
"db": "VULHUB",
"id": "VHN-64711"
},
{
"date": "2013-09-20T00:00:00",
"db": "BID",
"id": "62593"
},
{
"date": "2013-09-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-000092"
},
{
"date": "2013-09-20T15:26:04.230000",
"db": "NVD",
"id": "CVE-2013-4709"
},
{
"date": "2013-09-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201309-351"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2013-09-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2013-13230"
},
{
"date": "2015-03-05T00:00:00",
"db": "VULHUB",
"id": "VHN-64711"
},
{
"date": "2013-09-20T00:00:00",
"db": "BID",
"id": "62593"
},
{
"date": "2013-09-30T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2013-000092"
},
{
"date": "2015-03-05T13:24:10.220000",
"db": "NVD",
"id": "CVE-2013-4709"
},
{
"date": "2014-06-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201309-351"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201309-351"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL Series routers vulnerable to buffer overflow",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2013-000092"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201309-351"
}
],
"trust": 0.6
}
}
VAR-201406-0099
Vulnerability from variot - Updated: 2023-12-18 13:09The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to an issue in processing certain packets. (CWE-119)By receiving a specially crafted TCP packet, a session established using PPPAC may be disconnected or stop accepting connections. SEIL is a series of router devices. SEIL Series Routers are prone to a remote denial-of-service vulnerability. An attacker can leverage this issue to cause denial-of-service conditions; denying service to legitimate users. The following are vulnerable: SEIL/x86 1.00 to 3.10 SEIL/X1 1.00 to 4.50 SEIL/X2 1.00 to 4.50 SEIL/B1 1.00 to 4.50 SEIL/Turbo 1.80 to 2.17 SEIL/neu 2FE Plus 1.80 to 2.17. The following router products are affected: SEIL SEIL/x86 Routers Versions 1.00 to 3.10, SEIL/X1 Routers Versions 1.00 to 4.50, SEIL/X2 Routers Versions 1.00 to 4.50, SEIL/B1 Routers Versions 1.00 to 4.50, SEIL/Turbo Routers 1.80 to 2.17 Version, SEIL/neu 2FE Plus router version 1.80 to 2.17
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201406-0099",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "seil\\%2fneu 2fe plus",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.05"
},
{
"model": "seil\\%2fneu 2fe plus",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.80"
},
{
"model": "seil\\%2fturbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.05"
},
{
"model": "seil\\%2fneu 2fe plus",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.17"
},
{
"model": "seil\\%2fturbo",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.15"
},
{
"model": "seil\\%2fneu 2fe plus",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.15"
},
{
"model": "seil\\%2fx86",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "3.10"
},
{
"model": "seil\\%2fneu 2fe plus",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.16"
},
{
"model": "seil\\%2fx86",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.81"
},
{
"model": "seil\\%2fx86",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.82"
},
{
"model": "seil\\%2fb1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.50"
},
{
"model": "seil\\%2fx1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.31"
},
{
"model": "seil\\%2fx1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\%2fturbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.80"
},
{
"model": "seil\\/turbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\%2fx1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.30"
},
{
"model": "seil\\%2fx86",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.80"
},
{
"model": "seil\\%2fturbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.17"
},
{
"model": "seil\\%2fx2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.80"
},
{
"model": "seil\\/x86",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\%2fb1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.32"
},
{
"model": "seil\\%2fx2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.50"
},
{
"model": "seil\\%2fx2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.30"
},
{
"model": "seil\\%2fb1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.30"
},
{
"model": "seil\\%2fb1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.31"
},
{
"model": "seil\\%2fb1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\%2fx2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\/neu 2fe plus",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\%2fturbo",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.16"
},
{
"model": "seil\\%2fx86",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil\\%2fx1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.32"
},
{
"model": "seil/b1",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 4.50"
},
{
"model": "seil/neu 2fe plus",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/neu 2fe plus",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.80 to 2.17"
},
{
"model": "seil/turbo",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/turbo",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.80 to 2.17"
},
{
"model": "seil/x1",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 4.50"
},
{
"model": "seil/x2",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 4.50"
},
{
"model": "seil/x86",
"scope": null,
"trust": 0.8,
"vendor": "internet initiative",
"version": null
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 3.10"
},
{
"model": "seil/neu 2fe plus to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.802.17"
},
{
"model": "seil/turbo to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.802.17"
},
{
"model": "seil/b1 to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.004.50"
},
{
"model": "seil/x2 to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.004.50"
},
{
"model": "seil/x1 to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.004.50"
},
{
"model": "seil/x86 to",
"scope": "eq",
"trust": 0.6,
"vendor": "internet initiative",
"version": "1.003.10"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.35"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.61"
},
{
"model": "seil/x86",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.49"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.47"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.46"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.45"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.44"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.43"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.42"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.41"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.40"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.49"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.47"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.46"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.45"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.44"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.43"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.42"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.41"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.40"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.12"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.11"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.60"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.52"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.51"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.50"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.48"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "2.30"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03732"
},
{
"db": "BID",
"id": "68041"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-000055"
},
{
"db": "NVD",
"id": "CVE-2014-2004"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-323"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:1.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.81:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.82:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx2_firmware:1.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx2_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx2_firmware:4.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx2_firmware:4.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-2004"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "68041"
}
],
"trust": 0.3
},
"cve": "CVE-2014-2004",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Partial",
"baseScore": 5.0,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2014-000055",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2014-03732",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "VHN-69943",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-2004",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "IPA",
"id": "JVNDB-2014-000055",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2014-03732",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201406-323",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-69943",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03732"
},
{
"db": "VULHUB",
"id": "VHN-69943"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-000055"
},
{
"db": "NVD",
"id": "CVE-2014-2004"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-323"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to an issue in processing certain packets. (CWE-119)By receiving a specially crafted TCP packet, a session established using PPPAC may be disconnected or stop accepting connections. SEIL is a series of router devices. SEIL Series Routers are prone to a remote denial-of-service vulnerability. \nAn attacker can leverage this issue to cause denial-of-service conditions; denying service to legitimate users. \nThe following are vulnerable:\nSEIL/x86 1.00 to 3.10\nSEIL/X1 1.00 to 4.50\nSEIL/X2 1.00 to 4.50\nSEIL/B1 1.00 to 4.50\nSEIL/Turbo 1.80 to 2.17\nSEIL/neu 2FE Plus 1.80 to 2.17. The following router products are affected: SEIL SEIL/x86 Routers Versions 1.00 to 3.10, SEIL/X1 Routers Versions 1.00 to 4.50, SEIL/X2 Routers Versions 1.00 to 4.50, SEIL/B1 Routers Versions 1.00 to 4.50, SEIL/Turbo Routers 1.80 to 2.17 Version, SEIL/neu 2FE Plus router version 1.80 to 2.17",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-2004"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-000055"
},
{
"db": "CNVD",
"id": "CNVD-2014-03732"
},
{
"db": "BID",
"id": "68041"
},
{
"db": "VULHUB",
"id": "VHN-69943"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-2004",
"trust": 3.4
},
{
"db": "JVNDB",
"id": "JVNDB-2014-000055",
"trust": 2.5
},
{
"db": "JVN",
"id": "JVN10724763",
"trust": 2.5
},
{
"db": "BID",
"id": "68041",
"trust": 1.0
},
{
"db": "CNNVD",
"id": "CNNVD-201406-323",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2014-03732",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-69943",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03732"
},
{
"db": "VULHUB",
"id": "VHN-69943"
},
{
"db": "BID",
"id": "68041"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-000055"
},
{
"db": "NVD",
"id": "CVE-2014-2004"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-323"
}
]
},
"id": "VAR-201406-0099",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03732"
},
{
"db": "VULHUB",
"id": "VHN-69943"
}
],
"trust": 1.2151310215384614
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03732"
}
]
},
"last_update_date": "2023-12-18T13:09:21.202000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Internet Initiative Japan Inc. website",
"trust": 0.8,
"url": "http://www.seil.jp/support/security/a01443.html"
},
{
"title": "SEIL Series Routers patch for remote denial of service vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/46479"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03732"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-000055"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-69943"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-000055"
},
{
"db": "NVD",
"id": "CVE-2014-2004"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "http://jvn.jp/en/jp/jvn10724763/index.html"
},
{
"trust": 1.7,
"url": "http://www.seil.jp/support/security/a01443.html"
},
{
"trust": 1.7,
"url": "http://jvndb.jvn.jp/jvndb/jvndb-2014-000055"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-2004"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-2004"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/68041"
},
{
"trust": 0.3,
"url": "http://www.seil.jp/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-03732"
},
{
"db": "VULHUB",
"id": "VHN-69943"
},
{
"db": "BID",
"id": "68041"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-000055"
},
{
"db": "NVD",
"id": "CVE-2014-2004"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-323"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2014-03732"
},
{
"db": "VULHUB",
"id": "VHN-69943"
},
{
"db": "BID",
"id": "68041"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-000055"
},
{
"db": "NVD",
"id": "CVE-2014-2004"
},
{
"db": "CNNVD",
"id": "CNNVD-201406-323"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-06-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-03732"
},
{
"date": "2014-06-16T00:00:00",
"db": "VULHUB",
"id": "VHN-69943"
},
{
"date": "2014-06-13T00:00:00",
"db": "BID",
"id": "68041"
},
{
"date": "2014-06-13T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-000055"
},
{
"date": "2014-06-16T14:55:05.893000",
"db": "NVD",
"id": "CVE-2014-2004"
},
{
"date": "2014-06-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201406-323"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-06-18T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-03732"
},
{
"date": "2014-06-16T00:00:00",
"db": "VULHUB",
"id": "VHN-69943"
},
{
"date": "2014-06-13T00:00:00",
"db": "BID",
"id": "68041"
},
{
"date": "2014-06-17T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-000055"
},
{
"date": "2014-06-16T17:10:13.190000",
"db": "NVD",
"id": "CVE-2014-2004"
},
{
"date": "2014-06-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201406-323"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201406-323"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL Series routers vulnerable to denial-of-service (DoS)",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-000055"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer overflow",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201406-323"
}
],
"trust": 0.6
}
}
VAR-201502-0480
Vulnerability from variot - Updated: 2023-12-18 12:30npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing SSTP packets.Receiving a specially crafted SSTP packet may result in the device becoming unresponsive. There are security vulnerabilities in the npppd program in PPPAC for several SEIL routers. SEIL Series Routers are prone to a remote denial-of-service vulnerability. An attacker can leverage this issue to consume resources resulting in denial-of-service condition; denying service to legitimate users. The following products are vulnerable: SEIL/x86 Fuji 1.00 through 3.30 SEIL/X1 3.50 through 4.70 SEIL/X2 3.50 through 4.70 SEIL/B1 3.50 through 4.70. The following products and versions are affected: SEIL SEIL/x86 Fuji routers from version 1.00 to version 3.30, SEIL/X1 routers from version 3.50 to version 4.70, SEIL/X2 routers from version 3.50 to version 4.70, SEIL/B1 routers from version 3.50 to version 4.70
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201502-0480",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.29"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.28"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.26"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.35"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.32"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.27"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.33"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.34"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.31"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.46"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.90"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.60"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.96"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.11"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.96"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.95"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.70"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.75"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.70"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.32"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.41"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.70"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.05"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.02"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.04"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.75"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.90"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.51"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.60"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.53"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.93"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.45"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.80"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.31"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.90"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.07"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.89"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.19"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.82"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.16"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.22"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.63"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.99"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.98"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.14"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.05"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.92"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.13"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.70"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.83"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.87"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.73"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.40"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.70"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.71"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.60"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.90"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.78"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.74"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.75"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.85"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.91"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.81"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.12"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.30"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.53"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.44"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.92"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.30"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.11"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.61"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.74"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.25"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.51"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.60"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.56"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.81"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.91"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.00"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.39"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.49"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.13"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.58"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.16"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.03"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.70"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.80"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.34"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.21"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.98"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.03"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.40"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.07"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.70"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.00"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.95"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.02"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.30"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.19"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.94"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.83"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.32"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.04"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.85"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.75"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.18"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.41"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.60"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.53"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.91"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.08"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.01"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.65"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.48"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.06"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.79"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.93"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.47"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.17"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.55"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.57"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.91"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.87"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.88"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.21"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.77"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.62"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.34"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.31"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.79"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.40"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.18"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.78"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.15"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.84"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.01"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.86"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.76"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.70"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.08"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.99"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.36"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.00"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.90"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.10"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.60"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.32"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.17"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.06"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.24"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.86"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.14"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.41"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.30"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.09"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.97"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.20"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.75"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.84"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "*"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.94"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.59"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.53"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.88"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.43"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.23"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.89"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.97"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.91"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.67"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.37"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.77"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.66"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.71"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.00"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.51"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.60"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.09"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.15"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.69"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "3.12"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.76"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.72"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.72"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.38"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.64"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.54"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.31"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.82"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.73"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.34"
},
{
"model": "seil x86 fuji",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.68"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "4.00"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "3.50 to 4.70"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "3.50 to 4.70"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "3.50 to 4.70"
},
{
"model": "seil/x86 fuji",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "1.00 to 3.30"
},
{
"model": "seil/b1 routers",
"scope": "eq",
"trust": 0.6,
"vendor": "seil",
"version": "3.50-4.70"
},
{
"model": "seil/x2 routers",
"scope": "eq",
"trust": 0.6,
"vendor": "seil",
"version": "3.50-4.70"
},
{
"model": "seil/x1 router",
"scope": "eq",
"trust": 0.6,
"vendor": "seil",
"version": "3.50-4.70"
},
{
"model": "seil/x86 fuji routers",
"scope": "eq",
"trust": 0.6,
"vendor": "seil",
"version": "1.00-3.30"
},
{
"model": "seil/x86 fuji",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.30"
},
{
"model": "seil/x86 fuji",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.22"
},
{
"model": "seil/x86 fuji",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.70"
},
{
"model": "seil/x86 fuji",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "1.00"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.70"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.62"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.50"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.32"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.31"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.30"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.50"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.70"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.62"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.50"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.32"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.31"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.30"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.50"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.70"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.62"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.50"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.32"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.31"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "4.30"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.75"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.3,
"vendor": "seil",
"version": "3.50"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-01395"
},
{
"db": "BID",
"id": "72884"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-000031"
},
{
"db": "NVD",
"id": "CVE-2015-0887"
},
{
"db": "CNNVD",
"id": "CNNVD-201502-477"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.81:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.82:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.83:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.84:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.85:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.98:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.99:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.49:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.65:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.66:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.67:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.68:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.82:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.83:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.84:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.85:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.98:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.99:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.73:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.74:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.76:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.93:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.08:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.09:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.58:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.59:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.73:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.74:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.76:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.77:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.92:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.93:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.08:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.09:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.77:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.79:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.86:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.88:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.95:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.97:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.47:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.56:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.79:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.81:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.86:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.88:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.95:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.97:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.71:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.78:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.87:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.89:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.94:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.96:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.55:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.64:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.69:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.71:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.78:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.80:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.87:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.89:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.94:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.96:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil_x86_fuji:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:3.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:3.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:3.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:3.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:3.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:3.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x2_firmware:4.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:3.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:3.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:3.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:3.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:3.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:3.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/x1_firmware:4.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:3.91:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:3.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:3.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:3.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:4.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:3.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:iij:seil\\/b1_firmware:3.75:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2015-0887"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "JPCERT",
"sources": [
{
"db": "BID",
"id": "72884"
}
],
"trust": 0.3
},
"cve": "CVE-2015-0887",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"integrityImpact": "NONE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "Partial",
"baseScore": 4.3,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2015-000031",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"exploitabilityScore": 10.0,
"id": "CNVD-2015-01395",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-78833",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2015-0887",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "IPA",
"id": "JVNDB-2015-000031",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2015-01395",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201502-477",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-78833",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-01395"
},
{
"db": "VULHUB",
"id": "VHN-78833"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-000031"
},
{
"db": "NVD",
"id": "CVE-2015-0887"
},
{
"db": "CNNVD",
"id": "CNNVD-201502-477"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet. The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing SSTP packets.Receiving a specially crafted SSTP packet may result in the device becoming unresponsive. There are security vulnerabilities in the npppd program in PPPAC for several SEIL routers. SEIL Series Routers are prone to a remote denial-of-service vulnerability. \nAn attacker can leverage this issue to consume resources resulting in denial-of-service condition; denying service to legitimate users. \nThe following products are vulnerable:\nSEIL/x86 Fuji 1.00 through 3.30\nSEIL/X1 3.50 through 4.70\nSEIL/X2 3.50 through 4.70\nSEIL/B1 3.50 through 4.70. The following products and versions are affected: SEIL SEIL/x86 Fuji routers from version 1.00 to version 3.30, SEIL/X1 routers from version 3.50 to version 4.70, SEIL/X2 routers from version 3.50 to version 4.70, SEIL/B1 routers from version 3.50 to version 4.70",
"sources": [
{
"db": "NVD",
"id": "CVE-2015-0887"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-000031"
},
{
"db": "CNVD",
"id": "CNVD-2015-01395"
},
{
"db": "BID",
"id": "72884"
},
{
"db": "VULHUB",
"id": "VHN-78833"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2015-0887",
"trust": 3.4
},
{
"db": "JVN",
"id": "JVN63949115",
"trust": 2.8
},
{
"db": "JVNDB",
"id": "JVNDB-2015-000031",
"trust": 2.5
},
{
"db": "CNNVD",
"id": "CNNVD-201502-477",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2015-01395",
"trust": 0.6
},
{
"db": "BID",
"id": "72884",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-78833",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-01395"
},
{
"db": "VULHUB",
"id": "VHN-78833"
},
{
"db": "BID",
"id": "72884"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-000031"
},
{
"db": "NVD",
"id": "CVE-2015-0887"
},
{
"db": "CNNVD",
"id": "CNNVD-201502-477"
}
]
},
"id": "VAR-201502-0480",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-01395"
},
{
"db": "VULHUB",
"id": "VHN-78833"
}
],
"trust": 1.4576923075
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-01395"
}
]
},
"last_update_date": "2023-12-18T12:30:23.515000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Internet Initiative Japan Inc. website",
"trust": 0.8,
"url": "http://www.seil.jp/support/security/a01541.html"
},
{
"title": "SEIL Router PPP Access Concentrator Denial of Service Vulnerability Patch",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/55765"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-01395"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-000031"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-399",
"trust": 1.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-78833"
},
{
"db": "NVD",
"id": "CVE-2015-0887"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "http://jvn.jp/en/jp/jvn63949115/index.html"
},
{
"trust": 1.7,
"url": "http://www.seil.jp/support/security/a01541.html"
},
{
"trust": 1.7,
"url": "http://jvndb.jvn.jp/jvndb/jvndb-2015-000031"
},
{
"trust": 1.4,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0887"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0887"
},
{
"trust": 0.3,
"url": "http://www.seil.jp/"
},
{
"trust": 0.3,
"url": " http://www.seil.jp/support/security/a01541.html "
},
{
"trust": 0.3,
"url": "jvn.jp/en/jp/jvn63949115/index.html"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2015-01395"
},
{
"db": "VULHUB",
"id": "VHN-78833"
},
{
"db": "BID",
"id": "72884"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-000031"
},
{
"db": "NVD",
"id": "CVE-2015-0887"
},
{
"db": "CNNVD",
"id": "CNNVD-201502-477"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2015-01395"
},
{
"db": "VULHUB",
"id": "VHN-78833"
},
{
"db": "BID",
"id": "72884"
},
{
"db": "JVNDB",
"id": "JVNDB-2015-000031"
},
{
"db": "NVD",
"id": "CVE-2015-0887"
},
{
"db": "CNNVD",
"id": "CNNVD-201502-477"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-03-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-01395"
},
{
"date": "2015-02-28T00:00:00",
"db": "VULHUB",
"id": "VHN-78833"
},
{
"date": "2015-02-27T00:00:00",
"db": "BID",
"id": "72884"
},
{
"date": "2015-02-27T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-000031"
},
{
"date": "2015-02-28T02:59:37.923000",
"db": "NVD",
"id": "CVE-2015-0887"
},
{
"date": "2015-02-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201502-477"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-03-03T00:00:00",
"db": "CNVD",
"id": "CNVD-2015-01395"
},
{
"date": "2015-03-04T00:00:00",
"db": "VULHUB",
"id": "VHN-78833"
},
{
"date": "2015-05-07T17:28:00",
"db": "BID",
"id": "72884"
},
{
"date": "2015-03-05T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2015-000031"
},
{
"date": "2015-03-04T17:20:43.703000",
"db": "NVD",
"id": "CVE-2015-0887"
},
{
"date": "2015-03-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201502-477"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201502-477"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL Series routers vulnerable to denial-of-service (DoS)",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2015-000031"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201502-477"
}
],
"trust": 0.6
}
}
VAR-201008-0257
Vulnerability from variot - Updated: 2023-12-18 12:22The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address. SEIL/X Series and SEIL/B1 are routers. Only IPv6 Unicast RPF in strict mode is vulnerable. According to the developer, IPv6 Unicast RPF in loose mode and IPv4 Unicast RPF are not affected by this vulnerability.Packets that should be discarded, such as when an IP address is spoofed, may be transferred without being discarded. Seil/x2 Firmware is prone to a security bypass vulnerability. ----------------------------------------------------------------------
Secunia receives 'Frost & Sullivan's Global 2010 Customer Value Enhancement Award
Secunia outshines its competitors and receives the Frost & Sullivan’s Global 2010 Customer Value Enhancement Award. Based on its recent analysis of the vulnerability research market, Frost & Sullivan concluded:
"Secunia provides tremendous value for their customers, end-users, and to other security vendors."
Read more: http://secunia.com/blog/117/
TITLE: SEIL Routers IPv6 Unicast RPF Spoofing Vulnerability
SECUNIA ADVISORY ID: SA41088
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/41088/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=41088
RELEASE DATE: 2010-08-26
DISCUSS ADVISORY: http://secunia.com/advisories/41088/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/41088/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=41088
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: A vulnerability has been reported in SEIL routers, which can be exploited by malicious people to conduct spoofing attacks.
The vulnerability is reported in the following products: * SEIL/X1 firmware version 1.00 through 2.73 * SEIL/X2 firmware version 1.00 through 2.73 * SEIL/B1 firmware version 1.00 through 2.73
SOLUTION: Upgrade to firmware version 2.74.
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: SEIL: http://www.seil.jp/seilseries/security/2010/a00875.php
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201008-0257",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.10"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.62"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.73"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.70"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.20"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.63"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "1.11"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.6,
"vendor": "iij",
"version": "2.72"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.41"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.61"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.63"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.10"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.40"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.40"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.60"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.72"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.60"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.62"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.61"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.32"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.70"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.60"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.21"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.32"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.21"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.43"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.20"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.62"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.43"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.31"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.44"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.63"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.44"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.22"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.01"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.31"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.11"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.30"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.72"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.22"
},
{
"model": "seil\\/x1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.30"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.70"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil\\/b1",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "1.41"
},
{
"model": "seil\\/x2",
"scope": "eq",
"trust": 1.0,
"vendor": "iij",
"version": "2.61"
},
{
"model": "seil/b1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "firmware 1.00 to 2.73"
},
{
"model": "seil/x1",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "firmware 1.00 to 2.73"
},
{
"model": "seil/x2",
"scope": "eq",
"trust": 0.8,
"vendor": "internet initiative",
"version": "firmware 1.00 to 2.73"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.72"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.70"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.63"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.62"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.61"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.60"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.44"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.43"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.41"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.40"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.32"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.31"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.30"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.22"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.21"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.20"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.11"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.10"
},
{
"model": "seil%2fx2",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.00"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.73"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.72"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.70"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.63"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.62"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.61"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.60"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.44"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.43"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.41"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.40"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.32"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.31"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.30"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.22"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.21"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.20"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.11"
},
{
"model": "seil%2fx1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.10"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.72"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.70"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.63"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.62"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.61"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.60"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.52"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.51"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.50"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.42"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.41"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.40"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.30"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.20"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.10"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "2.01"
},
{
"model": "seil%2fb1",
"scope": "eq",
"trust": 0.3,
"vendor": "iij",
"version": "1.00"
}
],
"sources": [
{
"db": "BID",
"id": "78900"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-000032"
},
{
"db": "NVD",
"id": "CVE-2010-2363"
},
{
"db": "CNNVD",
"id": "CNNVD-201008-364"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.73:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:1.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/x2_firmware:1.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.72:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.70:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.60:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.62:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2010-2363"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Unknown",
"sources": [
{
"db": "BID",
"id": "78900"
}
],
"trust": 0.3
},
"cve": "CVE-2010-2363",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "IPA",
"availabilityImpact": "None",
"baseScore": 4.3,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "JVNDB-2010-000032",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "VHN-44968",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULMON",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CVE-2010-2363",
"impactScore": 4.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "MEDIUM",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2010-2363",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "IPA",
"id": "JVNDB-2010-000032",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-201008-364",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-44968",
"trust": 0.1,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2010-2363",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-44968"
},
{
"db": "VULMON",
"id": "CVE-2010-2363"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-000032"
},
{
"db": "NVD",
"id": "CVE-2010-2363"
},
{
"db": "CNNVD",
"id": "CNNVD-201008-364"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address. SEIL/X Series and SEIL/B1 are routers. Only IPv6 Unicast RPF in strict mode is vulnerable. According to the developer, IPv6 Unicast RPF in loose mode and IPv4 Unicast RPF are not affected by this vulnerability.Packets that should be discarded, such as when an IP address is spoofed, may be transferred without being discarded. Seil/x2 Firmware is prone to a security bypass vulnerability. ----------------------------------------------------------------------\n\n\nSecunia receives \u0027Frost \u0026 Sullivan\u0027s Global 2010 Customer Value Enhancement Award\n\nSecunia outshines its competitors and receives the Frost \u0026 Sullivan\u2019s Global 2010 Customer Value Enhancement Award. Based on its recent analysis of the vulnerability research market, Frost \u0026 Sullivan concluded:\n\n\"Secunia provides tremendous value for their customers, end-users, and to other security vendors.\"\n\nRead more: http://secunia.com/blog/117/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers IPv6 Unicast RPF Spoofing Vulnerability\n\nSECUNIA ADVISORY ID:\nSA41088\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/41088/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41088\n\nRELEASE DATE:\n2010-08-26\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/41088/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/41088/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41088\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in SEIL routers, which can be\nexploited by malicious people to conduct spoofing attacks. \n\nThe vulnerability is reported in the following products:\n* SEIL/X1 firmware version 1.00 through 2.73\n* SEIL/X2 firmware version 1.00 through 2.73\n* SEIL/B1 firmware version 1.00 through 2.73\n\nSOLUTION:\nUpgrade to firmware version 2.74. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nSEIL:\nhttp://www.seil.jp/seilseries/security/2010/a00875.php\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2010-2363"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-000032"
},
{
"db": "BID",
"id": "78900"
},
{
"db": "VULHUB",
"id": "VHN-44968"
},
{
"db": "VULMON",
"id": "CVE-2010-2363"
},
{
"db": "PACKETSTORM",
"id": "93040"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2010-2363",
"trust": 2.9
},
{
"db": "JVN",
"id": "JVN12683004",
"trust": 2.6
},
{
"db": "JVNDB",
"id": "JVNDB-2010-000032",
"trust": 2.6
},
{
"db": "SECUNIA",
"id": "41088",
"trust": 1.3
},
{
"db": "CNNVD",
"id": "CNNVD-201008-364",
"trust": 0.7
},
{
"db": "JVN",
"id": "JVN#12683004",
"trust": 0.6
},
{
"db": "BID",
"id": "78900",
"trust": 0.5
},
{
"db": "XF",
"id": "61382",
"trust": 0.3
},
{
"db": "VULHUB",
"id": "VHN-44968",
"trust": 0.1
},
{
"db": "VULMON",
"id": "CVE-2010-2363",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "93040",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-44968"
},
{
"db": "VULMON",
"id": "CVE-2010-2363"
},
{
"db": "BID",
"id": "78900"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-000032"
},
{
"db": "PACKETSTORM",
"id": "93040"
},
{
"db": "NVD",
"id": "CVE-2010-2363"
},
{
"db": "CNNVD",
"id": "CNNVD-201008-364"
}
]
},
"id": "VAR-201008-0257",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-44968"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T12:22:29.688000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "a00875",
"trust": 0.8,
"url": "http://www.seil.jp/seilseries/security/2010/a00875.php"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2010-000032"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-264",
"trust": 1.1
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-44968"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-000032"
},
{
"db": "NVD",
"id": "CVE-2010-2363"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "http://jvn.jp/en/jp/jvn12683004/index.html"
},
{
"trust": 2.2,
"url": "http://www.seil.jp/seilseries/security/2010/a00875.php"
},
{
"trust": 1.8,
"url": "http://jvndb.jvn.jp/en/contents/2010/jvndb-2010-000032.html"
},
{
"trust": 1.2,
"url": "http://secunia.com/advisories/41088"
},
{
"trust": 1.2,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61382"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2363"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2363"
},
{
"trust": 0.3,
"url": "http://xforce.iss.net/xforce/xfdb/61382"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/264.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.securityfocus.com/bid/78900"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/41088/"
},
{
"trust": 0.1,
"url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=41088"
},
{
"trust": 0.1,
"url": "http://secunia.com/products/corporate/evm/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/41088/#comments"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/personal/"
},
{
"trust": 0.1,
"url": "http://secunia.com/blog/117/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-44968"
},
{
"db": "VULMON",
"id": "CVE-2010-2363"
},
{
"db": "BID",
"id": "78900"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-000032"
},
{
"db": "PACKETSTORM",
"id": "93040"
},
{
"db": "NVD",
"id": "CVE-2010-2363"
},
{
"db": "CNNVD",
"id": "CNNVD-201008-364"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-44968"
},
{
"db": "VULMON",
"id": "CVE-2010-2363"
},
{
"db": "BID",
"id": "78900"
},
{
"db": "JVNDB",
"id": "JVNDB-2010-000032"
},
{
"db": "PACKETSTORM",
"id": "93040"
},
{
"db": "NVD",
"id": "CVE-2010-2363"
},
{
"db": "CNNVD",
"id": "CNNVD-201008-364"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-08-30T00:00:00",
"db": "VULHUB",
"id": "VHN-44968"
},
{
"date": "2010-08-30T00:00:00",
"db": "VULMON",
"id": "CVE-2010-2363"
},
{
"date": "2010-08-30T00:00:00",
"db": "BID",
"id": "78900"
},
{
"date": "2010-08-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2010-000032"
},
{
"date": "2010-08-25T05:39:54",
"db": "PACKETSTORM",
"id": "93040"
},
{
"date": "2010-08-30T20:00:01.983000",
"db": "NVD",
"id": "CVE-2010-2363"
},
{
"date": "2010-08-30T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201008-364"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-08-17T00:00:00",
"db": "VULHUB",
"id": "VHN-44968"
},
{
"date": "2017-08-17T00:00:00",
"db": "VULMON",
"id": "CVE-2010-2363"
},
{
"date": "2010-08-30T00:00:00",
"db": "BID",
"id": "78900"
},
{
"date": "2010-08-25T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2010-000032"
},
{
"date": "2017-08-17T01:32:43.103000",
"db": "NVD",
"id": "CVE-2010-2363"
},
{
"date": "2010-09-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201008-364"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201008-364"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "SEIL/X Series and SEIL/B1 IPv6 Unicast RPF vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2010-000032"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201008-364"
}
],
"trust": 0.6
}
}
FKIE_CVE-2015-0887
Vulnerability from fkie_nvd - Published: 2015-02-28 02:59 - Updated: 2025-04-12 10:46{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.70:*:*:*:*:*:*:*",
"matchCriteriaId": "0E8D02A6-04AB-417A-AE23-89C4D63C4B09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.71:*:*:*:*:*:*:*",
"matchCriteriaId": "E7BF46F8-354B-473B-AE3A-0FFEE3A0E981",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.72:*:*:*:*:*:*:*",
"matchCriteriaId": "269BC5F1-4EBC-48C2-A4D5-3C50FAA4CE69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.73:*:*:*:*:*:*:*",
"matchCriteriaId": "19814D90-B255-4D94-9F77-7B89511F95F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.74:*:*:*:*:*:*:*",
"matchCriteriaId": "BFBD3485-274B-4C45-913C-B130E98B90FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.75:*:*:*:*:*:*:*",
"matchCriteriaId": "87A64A33-C9C1-4E0E-B884-97F8F8970121",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.76:*:*:*:*:*:*:*",
"matchCriteriaId": "4BD43D90-A23A-41D3-9B0C-97AFE54964D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.77:*:*:*:*:*:*:*",
"matchCriteriaId": "22A1E090-CAF4-4921-80CE-C0EAF6D2844C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.78:*:*:*:*:*:*:*",
"matchCriteriaId": "2C27BCA0-B5F4-4DBE-8B59-FA64D16EC862",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.79:*:*:*:*:*:*:*",
"matchCriteriaId": "EF02258E-EA0E-450E-B848-81A97CF25E91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.80:*:*:*:*:*:*:*",
"matchCriteriaId": "7F2C0D20-CE04-43E9-98FA-AF670CEB6E97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.81:*:*:*:*:*:*:*",
"matchCriteriaId": "362BB56C-AF2D-4CB1-8E58-A97B1CE8EF59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.82:*:*:*:*:*:*:*",
"matchCriteriaId": "79F31568-6854-41D0-9259-2738879842CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.83:*:*:*:*:*:*:*",
"matchCriteriaId": "3E37B6EC-C283-4A92-981D-317E2D3CA692",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.84:*:*:*:*:*:*:*",
"matchCriteriaId": "370F89E6-CD53-4AE0-B393-70C036F0EBA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.85:*:*:*:*:*:*:*",
"matchCriteriaId": "3B6E5B61-BC6D-469C-AEAD-F6694410E1FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.86:*:*:*:*:*:*:*",
"matchCriteriaId": "03978110-0AF3-4F74-A9F0-CA3AA34A3C06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.87:*:*:*:*:*:*:*",
"matchCriteriaId": "11671A3A-1586-4B84-9DEF-7E3CBF9ADDD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.88:*:*:*:*:*:*:*",
"matchCriteriaId": "44758BCB-95C9-488D-856D-38D89F9670A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.89:*:*:*:*:*:*:*",
"matchCriteriaId": "5E15207D-7A07-4D72-BE98-39674ECA2AD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.90:*:*:*:*:*:*:*",
"matchCriteriaId": "C8F918D3-427A-41A2-84FE-60E4320A767E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.91:*:*:*:*:*:*:*",
"matchCriteriaId": "325D16D9-8A39-4086-8BAA-2A808E00225C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.92:*:*:*:*:*:*:*",
"matchCriteriaId": "83DA4AE8-CEB1-4992-ABC2-DABACFA27955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.93:*:*:*:*:*:*:*",
"matchCriteriaId": "F46FD868-B35C-453E-A2E2-722046CAE7F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.94:*:*:*:*:*:*:*",
"matchCriteriaId": "9BAD9397-FACC-4B18-B016-34883D3B4791",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.95:*:*:*:*:*:*:*",
"matchCriteriaId": "72E91627-EB59-4925-9261-1DEB2F9BB7A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.96:*:*:*:*:*:*:*",
"matchCriteriaId": "6B32738E-D269-45A9-9180-648BD6FADA8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.97:*:*:*:*:*:*:*",
"matchCriteriaId": "F6E3B306-65E1-45E5-934E-B4AA34D5BBA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.98:*:*:*:*:*:*:*",
"matchCriteriaId": "4FD90BA1-9EBA-49AD-B461-899E72691B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:1.99:*:*:*:*:*:*:*",
"matchCriteriaId": "B7F9568D-EDF8-48B4-B874-94D414C87A0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.00:*:*:*:*:*:*:*",
"matchCriteriaId": "2C0283C2-870E-43DA-8BEB-D28651004AB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "BE592911-1CE9-443C-BD18-2B564023606C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.02:*:*:*:*:*:*:*",
"matchCriteriaId": "B9F2AB73-608A-4B56-9D43-AD61CE4A94C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.03:*:*:*:*:*:*:*",
"matchCriteriaId": "859C1AC7-869D-4B2E-AAB6-E69207AF7126",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.04:*:*:*:*:*:*:*",
"matchCriteriaId": "47FC271F-4143-4728-9E2D-CFC85F88D0E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "4077D3DD-08D9-4863-95DC-221ABA7AE9B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.06:*:*:*:*:*:*:*",
"matchCriteriaId": "02F0A398-2C39-41CF-90E2-B7EE4870C88B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.07:*:*:*:*:*:*:*",
"matchCriteriaId": "17C008AA-E970-4351-ACE8-39524E690074",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.08:*:*:*:*:*:*:*",
"matchCriteriaId": "8824B46D-CA99-4CF7-BD22-B60522F37850",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.09:*:*:*:*:*:*:*",
"matchCriteriaId": "E208D11C-99CD-4E28-906D-B7ED9EF13E06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "561B1C88-3466-43A2-9809-588235CD2DA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "7B5F0ED3-C018-424B-B2DA-229569658C30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "E64DAB1B-082F-4B52-BAE7-62B688E6E12E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "5744FD65-AFAD-420E-82FA-8DFBFD08D643",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "B0D4403C-CA30-43AA-B526-ECD26286A833",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "13515FF8-3CEE-433C-9A67-36F7CE96A6AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "5203877D-6A8E-4DEC-BB45-65867FD4E0F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "EBEDA8DB-F84F-4128-90D7-A20ED2C27A53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "AEA46302-6A30-4A2E-B8EB-3FC236A81E3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "151F2C9F-C43B-4D5A-9638-46B8E9AC0EAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "646464DE-3E75-474C-B786-B583A4B14CC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "58FF130E-CA60-4042-A92F-69086F5B6A4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "3BE34539-2BF7-47E4-84E0-738449D2521E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "A1C751E0-A895-4187-A101-2F6522D83A70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "699B8612-571C-4C39-9396-9CB846C68A51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "1EAA392E-14BF-4D7C-93F4-5779C62BFF1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "8E5A76FE-E713-4297-BD27-46106B56A4F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "6F00B579-4CBA-492C-9042-F93B92E28F0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "53053828-CDA4-4D38-9AA8-CCF33B882258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.29:*:*:*:*:*:*:*",
"matchCriteriaId": "26BACB9F-7E92-44E5-933C-B7E6B0B20C54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "32D0D052-73FB-4F8F-8955-E96F61F6DEEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.31:*:*:*:*:*:*:*",
"matchCriteriaId": "A1A9CDFE-6A62-4BDF-AF0A-4760E725397A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.32:*:*:*:*:*:*:*",
"matchCriteriaId": "46104522-F559-412F-B661-18C2CA26A43C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.33:*:*:*:*:*:*:*",
"matchCriteriaId": "A5BB50D9-213A-482F-AF9F-55444D60D8BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.34:*:*:*:*:*:*:*",
"matchCriteriaId": "8BFB7057-6C06-4E83-A3C6-FF0FD43C07D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.35:*:*:*:*:*:*:*",
"matchCriteriaId": "324D3B81-DD74-42A4-B91A-9C5680DE54E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.36:*:*:*:*:*:*:*",
"matchCriteriaId": "2527E432-2154-4D37-BE72-41B337B46691",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.37:*:*:*:*:*:*:*",
"matchCriteriaId": "F278D549-ED29-4B66-80D0-B76C39D8E329",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.38:*:*:*:*:*:*:*",
"matchCriteriaId": "F032D842-DB0A-49C1-937B-7465A5BBB2D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.39:*:*:*:*:*:*:*",
"matchCriteriaId": "ABFB46EE-8A83-4D0D-A1C3-7124735809F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "6B9796E1-7B40-49E1-AFF8-5ED9794DAC0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "6B6EB09E-ED74-47FE-A6FE-53C26DD38A73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "2D0068DF-4884-4579-B48C-D1A927531116",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.43:*:*:*:*:*:*:*",
"matchCriteriaId": "355C0B14-788F-40F4-BC5C-201DFCE8F956",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.44:*:*:*:*:*:*:*",
"matchCriteriaId": "D91A205E-4300-48C5-8377-12C6FEC22EC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.45:*:*:*:*:*:*:*",
"matchCriteriaId": "EF147C19-9174-408A-84ED-7E00A236E0D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.46:*:*:*:*:*:*:*",
"matchCriteriaId": "D2AD23EF-6FAD-43FA-9EFA-E37392542712",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.47:*:*:*:*:*:*:*",
"matchCriteriaId": "8BD0DDF3-B88B-427A-B45D-C810C5F1071E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.48:*:*:*:*:*:*:*",
"matchCriteriaId": "3CDE25A0-3200-4559-9E17-9ECF866D4AE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.49:*:*:*:*:*:*:*",
"matchCriteriaId": "87E99D67-3615-44AE-8939-16B8BA23359F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "00B31EB1-7813-449D-B111-DE9FFFD04583",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "4C335733-E5EC-48B7-B546-793C915929B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "C9D4DA4C-9503-4BD1-A5A1-A33A1012BF0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.53:*:*:*:*:*:*:*",
"matchCriteriaId": "BAD4336F-5F90-4C98-ACC5-B217E762C1C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.54:*:*:*:*:*:*:*",
"matchCriteriaId": "95980354-068B-46A2-8D85-A4309E7F19EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.55:*:*:*:*:*:*:*",
"matchCriteriaId": "8BE8CE7E-3432-413F-9517-CD1D5C9AF1DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.56:*:*:*:*:*:*:*",
"matchCriteriaId": "C83D3A6A-A8BB-493C-8131-BF0DCC092950",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.57:*:*:*:*:*:*:*",
"matchCriteriaId": "7CABEC61-A16E-4814-9722-CEA4E1147C47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.58:*:*:*:*:*:*:*",
"matchCriteriaId": "D65F1DB4-D3CF-4BD5-B7EB-9AD6C9B23B90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.59:*:*:*:*:*:*:*",
"matchCriteriaId": "DC5E8836-AEE3-4259-9D23-807C5DD3F60C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "64FCFC9D-5582-4AF8-B4BD-FA1FDCC80E94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.61:*:*:*:*:*:*:*",
"matchCriteriaId": "7E0FEE7B-F339-4F45-8A04-06B8CC5DA558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.62:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E4B2EB-05D0-4E9C-B32B-99B3B64A52A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.63:*:*:*:*:*:*:*",
"matchCriteriaId": "0F608B7A-ED00-42EE-BA17-B7E7F3BC9952",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.64:*:*:*:*:*:*:*",
"matchCriteriaId": "305AA4E9-FAF3-4912-931C-1C1F818F46DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.65:*:*:*:*:*:*:*",
"matchCriteriaId": "273D931E-D841-4D1F-943B-CFFECF2EC8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.66:*:*:*:*:*:*:*",
"matchCriteriaId": "C55B16E6-4291-45B6-9B7D-E3BCAE6B8085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.67:*:*:*:*:*:*:*",
"matchCriteriaId": "75CD14A4-6147-4954-91DE-3B2536C3CCC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.68:*:*:*:*:*:*:*",
"matchCriteriaId": "A79800C2-FF93-4633-A8DD-21CDDAF54A6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.69:*:*:*:*:*:*:*",
"matchCriteriaId": "9E80BCC2-9E94-4D5C-AE8C-B54277FAB212",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.70:*:*:*:*:*:*:*",
"matchCriteriaId": "31CA2624-7784-4D22-B2C9-79A00B733D26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.71:*:*:*:*:*:*:*",
"matchCriteriaId": "5851431D-8C15-49C1-AB3B-34A6F701E685",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "08342E46-2B44-49E6-87F3-EF90B1A2B148",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.73:*:*:*:*:*:*:*",
"matchCriteriaId": "8CC52E69-7AF0-4E6C-9BC9-50298AB1C376",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.74:*:*:*:*:*:*:*",
"matchCriteriaId": "8CC0C55C-E479-4881-862A-1A6A37F17583",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.75:*:*:*:*:*:*:*",
"matchCriteriaId": "056BC669-3BD5-4BE0-A596-09154171C431",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.76:*:*:*:*:*:*:*",
"matchCriteriaId": "18C6BFA0-FE33-445F-B2D1-A8CE6033512B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.77:*:*:*:*:*:*:*",
"matchCriteriaId": "7723BC29-8EB2-48C5-8FDD-E4DAEBA075D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.78:*:*:*:*:*:*:*",
"matchCriteriaId": "1E3A227D-B259-428F-8641-8C18755B4721",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.79:*:*:*:*:*:*:*",
"matchCriteriaId": "10451901-0776-4E3B-8A6F-EE97C4383B07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.80:*:*:*:*:*:*:*",
"matchCriteriaId": "A5C03F1C-C2E7-46DA-8F1B-37BC1CC351BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.81:*:*:*:*:*:*:*",
"matchCriteriaId": "52890CD6-65E5-446D-B02B-80CAE0F6DF30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.82:*:*:*:*:*:*:*",
"matchCriteriaId": "4337DA2E-7CC3-40E3-B1A5-149ED94F8DBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.83:*:*:*:*:*:*:*",
"matchCriteriaId": "F69ED488-26B5-4B5A-BCB1-C1CFCB39DAD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.84:*:*:*:*:*:*:*",
"matchCriteriaId": "65A3B3E6-863F-44A8-B891-F3F6B807BC48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.85:*:*:*:*:*:*:*",
"matchCriteriaId": "CD3C8305-39F5-4CD9-A1A0-65A554B6D54C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.86:*:*:*:*:*:*:*",
"matchCriteriaId": "523F060A-4EEB-44FF-BBE0-94348CA55E75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.87:*:*:*:*:*:*:*",
"matchCriteriaId": "5566242D-E1A0-4E1C-80D4-EBE55B7E0EDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.88:*:*:*:*:*:*:*",
"matchCriteriaId": "DE5B8E8D-DAFD-474D-8B67-04687D245D61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.89:*:*:*:*:*:*:*",
"matchCriteriaId": "3D01CAD8-0A6A-4FA3-9E4E-A312B02BB8E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.90:*:*:*:*:*:*:*",
"matchCriteriaId": "D75C4B62-490A-48D1-B536-E03B7E7C2503",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.91:*:*:*:*:*:*:*",
"matchCriteriaId": "9E125585-F64E-4DCB-A32F-DCA82D3187C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.92:*:*:*:*:*:*:*",
"matchCriteriaId": "88D62430-4FF1-4E84-8A0B-37A09CEC0624",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.93:*:*:*:*:*:*:*",
"matchCriteriaId": "885DD3DE-1D6F-4914-B693-04C373A3462E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.94:*:*:*:*:*:*:*",
"matchCriteriaId": "B061E31C-62B5-4691-942A-49848147A8CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.95:*:*:*:*:*:*:*",
"matchCriteriaId": "5DF3D647-AF54-4340-A949-0ADD90FAA22F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.96:*:*:*:*:*:*:*",
"matchCriteriaId": "506B1D0D-70FF-42ED-A5F5-41D6060CE292",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.97:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFAC855-A033-4AC8-9AB5-C209BA612545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.98:*:*:*:*:*:*:*",
"matchCriteriaId": "04836653-9675-422F-80F2-EFCDA401835D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:2.99:*:*:*:*:*:*:*",
"matchCriteriaId": "ADDBE39C-1DA9-48A1-88A1-578082D7A863",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.00:*:*:*:*:*:*:*",
"matchCriteriaId": "4F0DAFA0-104F-4BE1-98F7-E1BEFB197637",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.01:*:*:*:*:*:*:*",
"matchCriteriaId": "6EB5B6C9-6A7F-4420-9978-078E14FEEB0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.02:*:*:*:*:*:*:*",
"matchCriteriaId": "D6450326-BA53-431A-A64C-93325D443E08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.03:*:*:*:*:*:*:*",
"matchCriteriaId": "BC43ACB2-6162-44EB-8D95-8A45E9B717F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.04:*:*:*:*:*:*:*",
"matchCriteriaId": "517F2DC3-9847-4DC3-B78A-5D6683E0C2E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.05:*:*:*:*:*:*:*",
"matchCriteriaId": "2E382C74-0D53-4162-B0E2-5863BF27366E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.06:*:*:*:*:*:*:*",
"matchCriteriaId": "A6A8862A-EE48-46AE-8690-DDDFE229FE1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.07:*:*:*:*:*:*:*",
"matchCriteriaId": "1BAC7176-C157-4EB6-9A58-E5F8D404DAF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.08:*:*:*:*:*:*:*",
"matchCriteriaId": "30C00243-39CB-491E-AA93-50A407EA830C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.09:*:*:*:*:*:*:*",
"matchCriteriaId": "CBB92797-728A-466D-B8EA-58AFD9023A9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE16D85-7284-4676-9A33-3026E8EACF81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0C09B843-CBE5-44C9-A69D-28C2DF6FBDB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "36805791-7BC6-4BFB-A965-E5808CCA54CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6FC3AD56-E7E4-44B6-986E-189B98CFD430",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "5C5F3C3E-7C3F-4D01-AB44-09574E56B61D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "9D23F45F-D529-458D-B938-0637291A64FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "B80C4633-355F-4AC4-91C6-CB2E0F9B7226",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "86AC9A44-CD20-4B33-8141-1C63E55E7993",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "DE96148E-4987-46B1-9823-229CF0FEB0D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.19:*:*:*:*:*:*:*",
"matchCriteriaId": "E7069524-E92E-4FA5-98D6-DC9DEEA84274",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.20:*:*:*:*:*:*:*",
"matchCriteriaId": "9CBF10BD-4B3F-49A1-82C0-57C3470CE54E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.21:*:*:*:*:*:*:*",
"matchCriteriaId": "A33B0AE6-E6E4-4719-A85C-92261125BE32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:3.30:*:*:*:*:*:*:*",
"matchCriteriaId": "46BB5E6D-38CE-467E-96BB-D0665E878BA8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil_x86_fuji:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB961AA2-6D5C-4979-AE8A-80D6D2D48071",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:3.51:*:*:*:*:*:*:*",
"matchCriteriaId": "4530D901-657F-4140-8691-996069C1472E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:3.60:*:*:*:*:*:*:*",
"matchCriteriaId": "8D40EFE4-3A05-483D-8303-FDD970CAFC99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:3.70:*:*:*:*:*:*:*",
"matchCriteriaId": "1CE1187B-1DBC-4CDF-8B0A-63F740DAF273",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:3.75:*:*:*:*:*:*:*",
"matchCriteriaId": "312EA312-639F-4F5A-A8E8-9E93781D3FE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:3.90:*:*:*:*:*:*:*",
"matchCriteriaId": "6E764062-0744-49CF-B39A-C44EFDBC7A27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:3.91:*:*:*:*:*:*:*",
"matchCriteriaId": "3193326D-43D1-45A8-99FB-4277238FCFF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:4.00:*:*:*:*:*:*:*",
"matchCriteriaId": "CF25B1E4-794B-4424-B9E8-456D64A8EB6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "72C6F9BB-9408-4E76-A00B-8005BE34160E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:4.31:*:*:*:*:*:*:*",
"matchCriteriaId": "A19E7E9F-0387-4CFD-95AF-E6F0E321CBA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:4.32:*:*:*:*:*:*:*",
"matchCriteriaId": "3D58697C-D7AA-416A-BA24-3445AFA7B10E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:4.34:*:*:*:*:*:*:*",
"matchCriteriaId": "62EFBF8B-7280-42D6-860B-B5AA71C8317B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:4.40:*:*:*:*:*:*:*",
"matchCriteriaId": "C427E6AA-6402-469F-AB34-C28EFAF60855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:4.41:*:*:*:*:*:*:*",
"matchCriteriaId": "AE3967A8-52EE-4D8A-9CA0-C50764A511A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:4.53:*:*:*:*:*:*:*",
"matchCriteriaId": "DF264F0D-5872-4C67-AB95-91BF49722FAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:4.60:*:*:*:*:*:*:*",
"matchCriteriaId": "4CDD8733-F19C-41EF-A4B3-95481751CA31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x2_firmware:4.70:*:*:*:*:*:*:*",
"matchCriteriaId": "EF1CE5D7-15F5-4A96-A83C-52DBDEFFC836",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:3.51:*:*:*:*:*:*:*",
"matchCriteriaId": "9A02B3D3-738A-49C6-A53C-F8EEE0D4273D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:3.60:*:*:*:*:*:*:*",
"matchCriteriaId": "CFCC51F8-0E31-4DC5-B222-0ED85DE9AC54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:3.70:*:*:*:*:*:*:*",
"matchCriteriaId": "40C7E64F-D5BF-4B16-8F0E-5E5BC8BFBA4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:3.75:*:*:*:*:*:*:*",
"matchCriteriaId": "C24B71AD-5AA7-4B46-AFC8-930B91619E32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:3.90:*:*:*:*:*:*:*",
"matchCriteriaId": "5A3DE86D-F2BD-4023-BA6C-4DE4CEC737EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:3.91:*:*:*:*:*:*:*",
"matchCriteriaId": "5A2C0948-D4C4-4228-BE25-C30E05830E58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.00:*:*:*:*:*:*:*",
"matchCriteriaId": "E8CE1949-B85A-4E5E-AB07-F0C90C305E0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "D4322627-3FDF-4F59-93A0-AE01F9B5A5DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.31:*:*:*:*:*:*:*",
"matchCriteriaId": "56273939-20AF-4815-B167-BCCF911D4E65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.32:*:*:*:*:*:*:*",
"matchCriteriaId": "02EF6BA5-B2F7-41E8-ABFA-92E260844589",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.34:*:*:*:*:*:*:*",
"matchCriteriaId": "60DFFE27-FF5F-4A9F-9B11-D1242378E7B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.40:*:*:*:*:*:*:*",
"matchCriteriaId": "C03E2424-7D18-42D3-A73F-CE9A0A543BA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.41:*:*:*:*:*:*:*",
"matchCriteriaId": "FDB1601D-4E05-4EC1-BAE5-B9AAD637A610",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.53:*:*:*:*:*:*:*",
"matchCriteriaId": "9ED699D8-2755-4903-AD86-3AE9D46BA803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.60:*:*:*:*:*:*:*",
"matchCriteriaId": "2721EAF7-775F-48F1-945C-30107B753577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.70:*:*:*:*:*:*:*",
"matchCriteriaId": "62DEAC03-96C1-4C4C-A6D9-F529FD6D019B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:3.51:*:*:*:*:*:*:*",
"matchCriteriaId": "C412E3CF-1A4A-43A0-99AA-52C08307BEE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:3.60:*:*:*:*:*:*:*",
"matchCriteriaId": "2BB155A9-FD12-428B-9AC1-E1E1DDB56186",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:3.70:*:*:*:*:*:*:*",
"matchCriteriaId": "5F38E8D8-6961-4F9E-BA06-61CD6BA1998E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:3.75:*:*:*:*:*:*:*",
"matchCriteriaId": "C2FE715A-9F1A-460B-899D-30ABCB197C71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:3.90:*:*:*:*:*:*:*",
"matchCriteriaId": "E4D35156-18E1-4388-A958-67E0439462D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:3.91:*:*:*:*:*:*:*",
"matchCriteriaId": "24C7AD43-A60D-488B-AC08-D86A61E1DCAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:4.00:*:*:*:*:*:*:*",
"matchCriteriaId": "543D71E0-39E8-4A55-94D3-49CE871ABCB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "673633DB-AF25-40C4-9BC9-99292937C240",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:4.31:*:*:*:*:*:*:*",
"matchCriteriaId": "DCBF77AD-5E99-4AA1-BD2C-87B0EDA33F7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:4.32:*:*:*:*:*:*:*",
"matchCriteriaId": "0F2F140B-3DF2-4CC6-9978-B6B7942F631A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:4.34:*:*:*:*:*:*:*",
"matchCriteriaId": "96357ECB-C793-4F15-BE12-32A789D0C467",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:4.40:*:*:*:*:*:*:*",
"matchCriteriaId": "DF9B4181-7600-4FD8-91FF-907C7660D47C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:4.41:*:*:*:*:*:*:*",
"matchCriteriaId": "0443F793-8982-4338-BC63-75AA6A3EF640",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:4.53:*:*:*:*:*:*:*",
"matchCriteriaId": "77648FEF-8672-4C68-95FB-BF1CC18F2682",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:4.60:*:*:*:*:*:*:*",
"matchCriteriaId": "91E31FF2-8899-4515-9A59-63048C2F2A25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/b1_firmware:4.70:*:*:*:*:*:*:*",
"matchCriteriaId": "ED6C3744-51E6-4709-A144-14ECADB68BB6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet."
},
{
"lang": "es",
"value": "npppd en PPP Access Concentrator (PPPAC) en los routers SEIL SEIL/x86 Fuji 1.00 hasta 3.30, los routers SEIL/X1 3.50 hasta 4.70, los routers SEIL/X2 3.50 hasta 4.70, y los routers SEIL/B1 3.50 hasta 4.70 permite a atacantes remotos causar una denegaci\u00f3n de servicio (bucle infinito y cuelgue del dispositivo) a trav\u00e9s de un paquete SSTP manipulado."
}
],
"id": "CVE-2015-0887",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-02-28T02:59:37.923",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://jvn.jp/en/jp/JVN63949115/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01541.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://jvn.jp/en/jp/JVN63949115/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01541.html"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-399"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-2004
Vulnerability from fkie_nvd - Published: 2014-06-16 14:55 - Updated: 2025-04-12 10:46{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:1.80:*:*:*:*:*:*:*",
"matchCriteriaId": "2D60C9B1-33AE-42B8-9521-20AF2351458A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "12D33318-9872-4757-9B6D-844A8FD34360",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "6F463AD3-69F3-48EF-98E6-7F3BF06517A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "C201F596-859B-4C9D-9043-5C82D75ADF93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "834A5422-67BC-4036-A007-60B41956D199",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC88F5F6-CB51-4676-91D6-69668229E675",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A637B6-3EC2-4BD8-89B4-3B259140412E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "CC5F0F67-6961-478C-9895-7EFC2FD7CD2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "5E159CF1-554D-4737-9506-59BFF0428C33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "73A44489-81E0-49F1-91EB-1E3CAA780313",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "32543A8B-CD82-4B84-A4C2-EC4B18A0DAC6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB4A421-197B-4654-B362-AEDA3ADADC33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "86111C25-1F23-43A0-A2C9-DADE78F16A0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.80:*:*:*:*:*:*:*",
"matchCriteriaId": "01A2F64E-4C0E-47F8-B314-3A4B101F23B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.81:*:*:*:*:*:*:*",
"matchCriteriaId": "B1C5DA19-0661-4735-AE91-E65EB59850EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.82:*:*:*:*:*:*:*",
"matchCriteriaId": "85398E2A-B6E0-40ED-855F-7EFEFE350B6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "BE60DCDF-C5A6-4BC8-9E5A-B2DA63517CCC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
"matchCriteriaId": "477E1688-0CA2-4BD0-A29C-3239B760FA3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx2_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "B02919BA-9D40-4882-A2E0-BE02EBF18862",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx2_firmware:1.80:*:*:*:*:*:*:*",
"matchCriteriaId": "F6DEE92C-0381-479B-8EA6-DB6EEE216764",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx2_firmware:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A57950-024E-4F86-ADC5-6ED33966CD73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx2_firmware:4.50:*:*:*:*:*:*:*",
"matchCriteriaId": "F0073D30-C4C7-4E12-A53D-4116496E3677",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2F6546-4443-48EE-B29E-B2999A22E906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "9EA8CA61-D4F6-4A11-87FC-E0898C73A04E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.31:*:*:*:*:*:*:*",
"matchCriteriaId": "11EAE136-B926-4FFE-B799-C13356F1848F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.32:*:*:*:*:*:*:*",
"matchCriteriaId": "1A8330E7-F52F-4C12-A07F-FBD3C01D382A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\/x1_firmware:4.50:*:*:*:*:*:*:*",
"matchCriteriaId": "0E686229-8BBE-48C0-B953-DF6B82A2B2D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "745A1DDE-27CA-4E82-9D7A-E6A11404E02E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "8AB1D5F4-986D-4D3F-800B-2BDD2EDE7DC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.31:*:*:*:*:*:*:*",
"matchCriteriaId": "7FE74E12-BDED-4459-89F9-18B0D621BF0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.32:*:*:*:*:*:*:*",
"matchCriteriaId": "C09830F5-3D79-455E-B211-A7B46318C83C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.50:*:*:*:*:*:*:*",
"matchCriteriaId": "2B80FBBD-1972-451A-98F2-80318DD37FF5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
},
{
"lang": "es",
"value": "PPP Access Concentrator (PPPAC) en routers SEIL SEIL/x86 1.00 hasta 3.10, routers SEIL/X1 1.00 hasta 4.50, routers SEIL/X2 1.00 hasta 4.50, routers SEIL/B1 1.00 hasta 4.50, routers SEIL/Turbo 1.80 hasta 2.17 y routers SEIL/neu 2FE Plus 1.80 hasta 2.17 permite a atacantes remotos causar una denegaci\u00f3n de servicio (terminaci\u00f3n de sesi\u00f3n o interrupci\u00f3n de concentrador) a trav\u00e9s de un paquete TCP manipulado."
}
],
"id": "CVE-2014-2004",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-06-16T14:55:05.893",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN10724763/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://www.seil.jp/support/security/a01443.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN10724763/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.seil.jp/support/security/a01443.html"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-4708
Vulnerability from fkie_nvd - Published: 2013-10-01 17:55 - Updated: 2025-04-11 00:51| Vendor | Product | Version | |
|---|---|---|---|
| iij | seil\%2fx1_firmware | 1.00 | |
| iij | seil\%2fx1_firmware | 4.30 | |
| iij | seil\/x1 | * | |
| iij | seil\%2fb1_firmware | 1.00 | |
| iij | seil\%2fb1_firmware | 4.30 | |
| iij | seil\/b1 | * | |
| iij | seil\%2fx2_firmware | 1.00 | |
| iij | seil\%2fx2_firmware | 4.30 | |
| iij | seil\/x2 | * | |
| iij | seil\%2fx86_firmware | 1.00 | |
| iij | seil\%2fx86_firmware | 2.80 | |
| iij | seil\/x86 | * | |
| iij | seil\%2fturbo_firmware | 1.80 | |
| iij | seil\%2fturbo_firmware | 2.05 | |
| iij | seil\%2fturbo_firmware | 2.15 | |
| iij | seil\/turbo | * | |
| iij | seil\%2fneu_2fe_plus_firmware | 1.80 | |
| iij | seil\%2fneu_2fe_plus_firmware | 2.05 | |
| iij | seil\%2fneu_2fe_plus_firmware | 2.15 | |
| iij | seil\/neu_2fe_plus | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2F6546-4443-48EE-B29E-B2999A22E906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "9EA8CA61-D4F6-4A11-87FC-E0898C73A04E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "745A1DDE-27CA-4E82-9D7A-E6A11404E02E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "8AB1D5F4-986D-4D3F-800B-2BDD2EDE7DC7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx2_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "B02919BA-9D40-4882-A2E0-BE02EBF18862",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx2_firmware:4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A57950-024E-4F86-ADC5-6ED33966CD73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "86111C25-1F23-43A0-A2C9-DADE78F16A0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.80:*:*:*:*:*:*:*",
"matchCriteriaId": "01A2F64E-4C0E-47F8-B314-3A4B101F23B5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
"matchCriteriaId": "477E1688-0CA2-4BD0-A29C-3239B760FA3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:1.80:*:*:*:*:*:*:*",
"matchCriteriaId": "2D60C9B1-33AE-42B8-9521-20AF2351458A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "12D33318-9872-4757-9B6D-844A8FD34360",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "6F463AD3-69F3-48EF-98E6-7F3BF06517A8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC88F5F6-CB51-4676-91D6-69668229E675",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A637B6-3EC2-4BD8-89B4-3B259140412E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "CC5F0F67-6961-478C-9895-7EFC2FD7CD2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "5E159CF1-554D-4737-9506-59BFF0428C33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB4A421-197B-4654-B362-AEDA3ADADC33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
},
{
"lang": "es",
"value": "El PPP Access Concentrator (PPPAC) en Internet Initiative Japan Inc. SEIL/x86 1.00 hasta la versi\u00f3n 2.80, SEIL/X1 1.00 hasta 4.30, SEIL/X2 1.00 hasta 4.30, SEIL/B1 1.00 hasta 4.30, SEIL/Turbo 1.80 hasta 2.15, y SEIL/neu 2FE Plus 1.80 hasta la versi\u00f3n 2.15 genera n\u00fameros aleatorios predecibles, lo que permite a atacantes remotos evadir la autenticaci\u00f3n RADIUS interceptando el tr\u00e1fico de RADIUS."
}
],
"id": "CVE-2013-4708",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-10-01T17:55:03.647",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN40079308/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://osvdb.org/97619"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01388.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN40079308/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/97619"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01388.html"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-310"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2013-4709
Vulnerability from fkie_nvd - Published: 2013-09-20 15:26 - Updated: 2025-04-11 00:51| Vendor | Product | Version | |
|---|---|---|---|
| iij | seil_x2_firmware | 1.00 | |
| iij | seil_x2_firmware | 4.31 | |
| iij | seil\/x2 | * | |
| iij | seil\%2fturbo_firmware | 2.05 | |
| iij | seil\%2fturbo_firmware | 2.15 | |
| iij | seil\/turbo | * | |
| iij | seil\%2fneu_2fe_plus_firmware | 2.05 | |
| iij | seil\%2fneu_2fe_plus_firmware | 2.15 | |
| iij | seil\/neu_2fe_plus | * | |
| iij | seil\%2fb1_firmware | 1.00 | |
| iij | seil\%2fb1_firmware | 4.31 | |
| iij | seil\/b1 | * | |
| iij | seil\%2fx86_firmware | 1.00 | |
| iij | seil\%2fx86_firmware | 2.81 | |
| iij | seil\/x86 | * | |
| iij | seil\%2fx1_firmware | 1.00 | |
| iij | seil\%2fx1_firmware | 4.31 | |
| iij | seil\/x1 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil_x2_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "63D5F850-2020-4951-9D8A-1B50E4F8541C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil_x2_firmware:4.31:*:*:*:*:*:*:*",
"matchCriteriaId": "15FD9501-0A71-4060-898B-5D2CC101DE1E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "12D33318-9872-4757-9B6D-844A8FD34360",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fturbo_firmware:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "6F463AD3-69F3-48EF-98E6-7F3BF06517A8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC88F5F6-CB51-4676-91D6-69668229E675",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "CC5F0F67-6961-478C-9895-7EFC2FD7CD2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fneu_2fe_plus_firmware:2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "5E159CF1-554D-4737-9506-59BFF0428C33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB4A421-197B-4654-B362-AEDA3ADADC33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "745A1DDE-27CA-4E82-9D7A-E6A11404E02E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fb1_firmware:4.31:*:*:*:*:*:*:*",
"matchCriteriaId": "7FE74E12-BDED-4459-89F9-18B0D621BF0F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "86111C25-1F23-43A0-A2C9-DADE78F16A0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx86_firmware:2.81:*:*:*:*:*:*:*",
"matchCriteriaId": "B1C5DA19-0661-4735-AE91-E65EB59850EC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
"matchCriteriaId": "477E1688-0CA2-4BD0-A29C-3239B760FA3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "9F2F6546-4443-48EE-B29E-B2999A22E906",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:iij:seil\\%2fx1_firmware:4.31:*:*:*:*:*:*:*",
"matchCriteriaId": "11EAE136-B926-4FFE-B799-C13356F1848F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
},
{
"lang": "es",
"value": "Desbordamiento de buffer en PPP Access Concentrator (PPPAC) en SEIL/x86 con firmware anterior a 2.82, SEIL/X1 con firmware anterior a 4.32, SEIL/X2 con firmware anterior a 4.32, SEIL/B1 con firmware anterior a 4.32, SEIL/Turbo con firmware anterior a 2.16, y SEIL/neu 2FE Plus con firmware anterior a 2.16 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un mensaje L2PT manipulado."
}
],
"id": "CVE-2013-4709",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2013-09-20T15:26:04.230",
"references": [
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://jvn.jp/en/jp/JVN43152129/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01396.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://jvn.jp/en/jp/JVN43152129/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01396.html"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2011-0454
Vulnerability from fkie_nvd - Published: 2011-03-01 23:00 - Updated: 2025-04-11 00:51{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "43F0BE07-FC42-4AB1-A553-1B254CC57D4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "1DADC38F-D530-49FC-A834-3BBC5FF71C27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E8A3B3F1-3342-4F6B-A0CC-4A1A7D6E163F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "F76EDD89-9C58-40BE-B7AE-72E82D051641",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA0DBD0-9181-45DB-83AB-74B63C4644DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "488614FD-E4DF-4E6B-B928-444D98076F4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A638B5-5FBC-4193-879D-883CF2777200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE84A44-AAB5-4D3F-ADE5-617E58B14E68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "507272EC-6B90-46DA-9E9A-EF5DCB770E7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "5C74FA35-319D-4B10-868A-A6CFAD137978",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "62B1B7C9-70C7-456B-B8C3-FF9BFECF6B1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "BAFEF605-5A5F-4738-9DE3-30F7CCA41B7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.61:*:*:*:*:*:*:*",
"matchCriteriaId": "71B53A2B-FF57-42B1-957B-E01CC8DE087B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.62:*:*:*:*:*:*:*",
"matchCriteriaId": "8C0D8323-9921-415C-B47C-49A947068F68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.63:*:*:*:*:*:*:*",
"matchCriteriaId": "EEBE6E5A-691F-46EF-B999-18ED949BF2A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.70:*:*:*:*:*:*:*",
"matchCriteriaId": "11181F82-4A35-43AD-838E-E07092DF8652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "FD9E04C4-EA46-4F14-A60B-12CAD9E98485",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.73:*:*:*:*:*:*:*",
"matchCriteriaId": "1108097E-7B13-41A8-A6FC-0F958BFEB94F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.74:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB61B92-399A-45AD-A2EB-886F01DE57D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.75:*:*:*:*:*:*:*",
"matchCriteriaId": "8A0928B5-60AB-4F2B-BF12-EEFF0CC38CD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:3.01:*:*:*:*:*:*:*",
"matchCriteriaId": "30C0244F-E26B-45E6-A14F-0482B22C4E8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:3.02:*:*:*:*:*:*:*",
"matchCriteriaId": "0D4FF3BD-1659-4582-AF3E-385829001579",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "E2F107CD-7985-4529-B9CB-F15C9EE80975",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "5C947580-1489-4B27-A740-1A5853170E89",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "6C2D29BB-DAEC-4D24-AA79-E7F136D37B0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "0B23BF51-78E0-46B7-8288-16EB6C1D210C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "953C86E4-3E0F-4A75-BD27-EF8BE4F48894",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "D3D7717A-A3E4-45A8-A774-3C2855267FCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "A7500641-D607-4221-ADA2-CBCC338F22A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "21A290E5-32F5-42AE-BDE8-C92B84A44D01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "ACAB1F52-6BC3-418D-AC2A-F66C34B6E2DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "35BC7F97-3208-43EE-B931-A28CD9A3515F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "3C03EE30-DC89-4926-A1FF-F878B4F9E205",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.40:*:*:*:*:*:*:*",
"matchCriteriaId": "90546F95-8BA1-4F13-86F4-91F797528281",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "5FA8842C-D4BF-4B8F-89EC-DAEE94AB8A12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "F9A47FE3-A7E3-41FF-81B2-A41CCB776924",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:1.44:*:*:*:*:*:*:*",
"matchCriteriaId": "8B75E486-B21A-4155-A4F8-155CD3A2EB59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "7858BAD1-7CFD-4602-9BC4-E4FC82EA38DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "BFC463DA-EEBC-4D74-B7C5-3235C15DFBF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "E10BC7EF-5A3B-4026-9EDA-15061EBF814E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "23564CCD-7EF3-4457-99FB-BFE966D35D5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "BD52B307-EA12-48FC-ACD5-01AEDED44A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "36F1D4E9-40BB-4BA6-9C44-5E06C8D98291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6EC374-64D2-4990-A4C4-86529CCF27C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "DAAA887F-7944-4C31-A191-0A39BC4E6544",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "35A5F2AA-23C4-43D4-B355-A9971503E3DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "51EA78DB-5273-48F5-9350-EABAEE8FD79A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.61:*:*:*:*:*:*:*",
"matchCriteriaId": "E805B146-572E-466E-BF0B-6B53970A72EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.62:*:*:*:*:*:*:*",
"matchCriteriaId": "86AAEE2F-8D63-4167-A6C8-DAD2F235015D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.63:*:*:*:*:*:*:*",
"matchCriteriaId": "C83696CE-91F3-4559-B16A-D1CF1C915515",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.70:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF4C61B-393E-44E4-9404-BC331C8E8729",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "CF4E913E-1E8D-439B-8B77-35A54E42EC98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.73:*:*:*:*:*:*:*",
"matchCriteriaId": "C75C2643-7F2A-4C34-94A0-DCB60399EF07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.74:*:*:*:*:*:*:*",
"matchCriteriaId": "3B8E0B95-CFD0-4501-B98E-FC05113F7022",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.75:*:*:*:*:*:*:*",
"matchCriteriaId": "9F916DA4-79A9-4523-907C-812E3FDF69FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:3.01:*:*:*:*:*:*:*",
"matchCriteriaId": "CD9E82EF-2A12-4A7F-8559-D8D2147FB74D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:3.02:*:*:*:*:*:*:*",
"matchCriteriaId": "ADEE64C1-72A3-42FF-A13F-7F3E5F41F53B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "CDC574B6-B448-4A51-B5A0-2F521205D4DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "71A0080D-3532-46E2-AC7D-F3E3E73622D4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "D3E85DA6-E3A3-43AA-8144-F1404DEB7F4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "5CE87EF1-4EA4-4490-A3E7-BA911A5F37AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "59204C16-8DC1-4BA0-9F73-560CC6D0E37B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "22F3DFD4-AFDB-4F24-AB48-D03A64BE4AA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "D4D9FA28-CFF2-4B84-90BC-A04C9E0C7BBC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "A3F5ABC9-271D-4E9A-A3E7-C53C1A96B8D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "A420F017-83DC-4029-A0F8-F50ED600CEA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "2923D4A5-FD10-4846-B2F5-93C64DEB081E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "9D07EB84-D033-423B-AD53-D7B47DC508C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.40:*:*:*:*:*:*:*",
"matchCriteriaId": "CB31A5D1-6219-4E7D-965A-65C885C71C62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.41:*:*:*:*:*:*:*",
"matchCriteriaId": "4383E0DF-E0D2-4E59-8053-CFD57F4C11C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.43:*:*:*:*:*:*:*",
"matchCriteriaId": "25B9C033-965D-420F-8F71-C650592D5AE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:1.44:*:*:*:*:*:*:*",
"matchCriteriaId": "3CCB5982-5ECF-471C-8731-59AB4784055F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "EF907907-1E85-4F85-84ED-0DB73466186F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "429DBDFD-C32D-4888-BC36-FCE5896FC963",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "C4C47A3C-D478-44E9-8183-735CF9CFBC2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "416DCB14-271A-4578-9AE7-418C75ADC4C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "FEBFCE3F-FE95-4559-A972-5241D48CB902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "0064F721-57E1-4AC4-A3C3-92E05B64F0F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "ED8A76A3-9CD8-4A3C-BDD4-53407A92E527",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "509DC30B-7D2F-43A7-9FD3-71FC405F520E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "809E64CE-504D-49BB-8C76-09D95F814893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.60:*:*:*:*:*:*:*",
"matchCriteriaId": "FE0DC6F5-9E0E-4FA9-A5A1-323229A8325A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.61:*:*:*:*:*:*:*",
"matchCriteriaId": "7B70D647-FEC1-4ED8-BF60-D3E9852DF4CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.62:*:*:*:*:*:*:*",
"matchCriteriaId": "8FC22870-8A4A-483E-AA38-325E1564E4AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.63:*:*:*:*:*:*:*",
"matchCriteriaId": "07952D84-10F6-46D0-B896-89401F063888",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.70:*:*:*:*:*:*:*",
"matchCriteriaId": "3BB8C1C6-D47D-4A85-8997-9E356688DA24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.72:*:*:*:*:*:*:*",
"matchCriteriaId": "07AB01A2-0CC3-49E6-B1A1-FF1BD918019E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.73:*:*:*:*:*:*:*",
"matchCriteriaId": "38FA01CD-625E-4DE4-8898-725AF4D8D2B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.74:*:*:*:*:*:*:*",
"matchCriteriaId": "88B39BDF-A579-4C67-98E8-C017F426076C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.75:*:*:*:*:*:*:*",
"matchCriteriaId": "6285D504-1960-42B4-8F7B-1AEDEB9AE865",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:3.01:*:*:*:*:*:*:*",
"matchCriteriaId": "F2F9FFA1-A224-473B-9827-7F5F40A20837",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:3.02:*:*:*:*:*:*:*",
"matchCriteriaId": "B3F86FC7-A7B2-4A58-9CDA-3056CE4C9AD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "35160F7C-5804-4A43-96F8-31456EED7DDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "486D5372-371D-4E43-B2AA-2E7236C8BDB0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x86_firmware:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "73301872-EFC2-4E08-B166-ECBBEC6DB310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x86_firmware:1.61:*:*:*:*:*:*:*",
"matchCriteriaId": "F0C2C21D-8DEA-4BD4-B116-875DAF8F9AB7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x86:*:*:*:*:*:*:*:*",
"matchCriteriaId": "477E1688-0CA2-4BD0-A29C-3239B760FA3C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.80:*:*:*:*:*:*:*",
"matchCriteriaId": "CB84E030-ADCF-4A17-878C-BE6FD000DA18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.81:*:*:*:*:*:*:*",
"matchCriteriaId": "D157BDC2-5ABA-4B94-B497-7814656FB4DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.82:*:*:*:*:*:*:*",
"matchCriteriaId": "A57A7B71-F867-4229-96C5-F92DA246965D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.83:*:*:*:*:*:*:*",
"matchCriteriaId": "DF8B532D-A45C-4111-A251-2BD9130DA95A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.84:*:*:*:*:*:*:*",
"matchCriteriaId": "F235CD04-35C6-4682-A106-843CF8E46110",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.85:*:*:*:*:*:*:*",
"matchCriteriaId": "D4A112F5-13F8-462E-87CF-AB2CC460CEF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.90:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF5549D-33D5-420A-9B3E-6DF9312C4E4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.91:*:*:*:*:*:*:*",
"matchCriteriaId": "37B08D35-81CD-40C1-B2D9-84D6E59CF0C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.92:*:*:*:*:*:*:*",
"matchCriteriaId": "A60CE6E6-9534-449B-A94A-BEBA13098168",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.93:*:*:*:*:*:*:*",
"matchCriteriaId": "11E4367A-457C-4B7F-9BE8-53E3D2B49619",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.94:*:*:*:*:*:*:*",
"matchCriteriaId": "6BA6C92F-E66D-452C-9270-6DFC4D7F1F4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.95:*:*:*:*:*:*:*",
"matchCriteriaId": "F116BC45-BE30-4792-9608-EFB81C98474D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.96:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE8DDF0-7669-45BD-820C-81FC8E13155F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.98:*:*:*:*:*:*:*",
"matchCriteriaId": "601CA34B-CAC4-4ED9-8ACB-5A33CC094043",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:1.99:*:*:*:*:*:*:*",
"matchCriteriaId": "4D045157-F49D-43B5-B72E-21E04169F6FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.00:*:*:*:*:*:*:*",
"matchCriteriaId": "9F74F4DE-5345-4143-8491-E7309E382F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "2A875FD5-EB5C-4656-AB9D-18C4B8292603",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.02:*:*:*:*:*:*:*",
"matchCriteriaId": "2B674EC4-814A-47FD-AA07-F2771A69E8FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.03:*:*:*:*:*:*:*",
"matchCriteriaId": "E3472F4F-8EB5-4FB1-A4D8-906C12881A19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.04:*:*:*:*:*:*:*",
"matchCriteriaId": "37EF3613-AC50-4247-944C-C458665586EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "0956BF1C-0002-496A-A016-6EB39241A6BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.06:*:*:*:*:*:*:*",
"matchCriteriaId": "6E1F0CCF-9850-4947-AB9B-B6B1F9B062D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.07:*:*:*:*:*:*:*",
"matchCriteriaId": "CF1465E3-0262-4D2F-BE9F-283975E2333A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.08:*:*:*:*:*:*:*",
"matchCriteriaId": "B3165577-0B87-432C-9358-0AABDC43962F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.09:*:*:*:*:*:*:*",
"matchCriteriaId": "218A23E8-73D4-455C-9394-6815393FF16D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/turbo_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "96AD6D79-11A9-495B-A2B5-72FB4F038285",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/turbo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC88F5F6-CB51-4676-91D6-69668229E675",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.80:*:*:*:*:*:*:*",
"matchCriteriaId": "F8670AD0-35C3-4438-A181-7521EC847A8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.81:*:*:*:*:*:*:*",
"matchCriteriaId": "6DC07A9F-315F-4568-BFE8-F0059DE1F9CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.82:*:*:*:*:*:*:*",
"matchCriteriaId": "940393EB-8F83-4F7C-89B3-ACD8408DB042",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.83:*:*:*:*:*:*:*",
"matchCriteriaId": "7020FE3C-4828-4A93-AB2A-468E560D8B5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.84:*:*:*:*:*:*:*",
"matchCriteriaId": "453CDEAE-AC98-43E0-A911-81851218627C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.85:*:*:*:*:*:*:*",
"matchCriteriaId": "65AB86F2-B376-485F-B5B0-320F6ADA07BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.90:*:*:*:*:*:*:*",
"matchCriteriaId": "C827210B-2416-4359-9332-E90FF4F21677",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.91:*:*:*:*:*:*:*",
"matchCriteriaId": "E12BA97C-1DCB-46D2-B0CB-1ACE81075706",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.92:*:*:*:*:*:*:*",
"matchCriteriaId": "E77F9AD8-D3A9-4F54-9FE4-92BBD2F46AD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.93:*:*:*:*:*:*:*",
"matchCriteriaId": "0EA6A477-7672-47EB-B87C-E1C6AAF50F31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.94:*:*:*:*:*:*:*",
"matchCriteriaId": "88FE1585-45C4-429F-928A-C046ABCA9017",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.95:*:*:*:*:*:*:*",
"matchCriteriaId": "ADA2BCF0-C05B-41C5-96B5-C95DD436F8D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.96:*:*:*:*:*:*:*",
"matchCriteriaId": "1869AC1F-51B0-4526-8EDA-DEF06C367451",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.98:*:*:*:*:*:*:*",
"matchCriteriaId": "0CF07485-398B-47D4-862A-95F7E5E290E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:1.99:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE93F86-E9A8-4998-BBF3-FF7EDD77B97C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.00:*:*:*:*:*:*:*",
"matchCriteriaId": "69D2A024-111B-4277-8C98-65A68D08EBD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "38F6905E-F264-4646-A242-6594431F14A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.02:*:*:*:*:*:*:*",
"matchCriteriaId": "0773B6A6-ABAD-44A6-B603-8223A6DFBB19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.03:*:*:*:*:*:*:*",
"matchCriteriaId": "47E78806-7F68-4544-ADAE-C406320BE9B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.04:*:*:*:*:*:*:*",
"matchCriteriaId": "1D036A01-44D0-4765-9A9A-FF85AF6F2288",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.05:*:*:*:*:*:*:*",
"matchCriteriaId": "606B52C7-1B72-457E-88F8-F640D9680561",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.06:*:*:*:*:*:*:*",
"matchCriteriaId": "1171554F-CD60-4828-B09F-067F15970A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.07:*:*:*:*:*:*:*",
"matchCriteriaId": "0D887445-7CD6-4F2A-BC42-CF695A68269E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.08:*:*:*:*:*:*:*",
"matchCriteriaId": "41F891F4-BB36-4B92-B87D-261CECA4DD15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.09:*:*:*:*:*:*:*",
"matchCriteriaId": "DE2696E1-2EE9-4020-857A-2F548FB61D6B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/neu_2fe_plus_firmware:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "87A0AD7B-23AC-4292-9572-1C3574327C95",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/neu_2fe_plus:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CFB4A421-197B-4654-B362-AEDA3ADADC33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
},
{
"lang": "es",
"value": "Desbordamiento de buffer en el concentrador de acceso PPP (\"PPP Access Concentrator\" o PPPAC) en SEIL/x86 con firmware 1.00 hasta 1.61, SEIL/B1 con firmware 1.00 hasta 3.11, SEIL/X1 con firmware 1.00 hasta 3.11, SEIL/X2 con firmware 1.00 hasta 3.11, SEIL/Turbo con firmware 1.80 hasta 2.10, y SEIL/neu 2FE Plus con firmware 1.80 hasta 2.10 puede permitir a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un paquete PPPoE."
}
],
"id": "CVE-2011-0454",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-03-01T23:00:02.800",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43494"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://www.securityfocus.com/bid/46598"
},
{
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/43494"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/46598"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-4409
Vulnerability from fkie_nvd - Published: 2009-12-23 21:30 - Updated: 2025-04-09 00:30{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:1.00:*:*:*:*:*:*:*",
"matchCriteriaId": "7AB18B1D-6DB6-4096-83EC-9608678218DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9B7A67-49CD-4D42-B5C5-E45BE775EDB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FB22791F-D919-4B32-86E7-83ACBE6D4F03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "3D36BD6C-7802-473A-B8A1-BD4D687F3AEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "E8617348-4572-4277-AFB4-241F4A38687F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "D73D5590-F721-4A8C-95D8-B396198FB27D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "6382F122-161C-433D-AF82-0E8E4073A392",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "C4772B30-D3E3-49AC-86F7-CEAE59CECE02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "477AEE25-5F49-4DCA-95C3-61DF83E4E91D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "558625E8-5613-4993-84DF-C0ECF0C92325",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:2.52:*:*:*:*:*:*:*",
"matchCriteriaId": "8D4BB407-DECF-4E84-BF99-9CE2A93A84A7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack."
},
{
"lang": "es",
"value": "La autenticaci\u00f3n (1) CHAP y (2) MS-CHAP-V2 en la funci\u00f3n PPP Access Concentrator (PPPAC) en el firmware Internet Initiative Japan SEIL/B1 v1.00 hasta v2.52 utiliza el mismo desaf\u00edo para cada intento de autenticaci\u00f3n, permitiendo a atacantes remotos saltar la autenticaci\u00f3n mediante un ataque de repetici\u00f3n."
}
],
"id": "CVE-2009-4409",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-12-23T21:30:00.313",
"references": [
{
"source": "cve@mitre.org",
"url": "http://jvn.jp/en/jp/JVN49602378/index.html"
},
{
"source": "cve@mitre.org",
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000079.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37628"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/61118"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/37293"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00697.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN49602378/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000079.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37628"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/61118"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/37293"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00697.php"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-4293
Vulnerability from fkie_nvd - Published: 2009-12-10 23:30 - Updated: 2025-04-09 00:30| Vendor | Product | Version | |
|---|---|---|---|
| iij | seil\/x1_firmware | 2.30 | |
| iij | seil\/x1_firmware | 2.40 | |
| iij | seil\/x1_firmware | 2.41 | |
| iij | seil\/x1_firmware | 2.42 | |
| iij | seil\/x1_firmware | 2.50 | |
| iij | seil\/x1_firmware | 2.51 | |
| iij | seil\/x1 | * | |
| iij | seil\/b1_firmware | 2.30 | |
| iij | seil\/b1_firmware | 2.40 | |
| iij | seil\/b1_firmware | 2.41 | |
| iij | seil\/b1_firmware | 2.42 | |
| iij | seil\/b1_firmware | 2.50 | |
| iij | seil\/b1_firmware | 2.51 | |
| iij | seil\/b1 | * | |
| iij | seil\/x2_firmware | 2.30 | |
| iij | seil\/x2_firmware | 2.40 | |
| iij | seil\/x2_firmware | 2.41 | |
| iij | seil\/x2_firmware | 2.42 | |
| iij | seil\/x2_firmware | 2.50 | |
| iij | seil\/x2_firmware | 2.51 | |
| iij | seil\/x2 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "E10BC7EF-5A3B-4026-9EDA-15061EBF814E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "23564CCD-7EF3-4457-99FB-BFE966D35D5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "BD52B307-EA12-48FC-ACD5-01AEDED44A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "36F1D4E9-40BB-4BA6-9C44-5E06C8D98291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6EC374-64D2-4990-A4C4-86529CCF27C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "DAAA887F-7944-4C31-A191-0A39BC4E6544",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "2CA0DBD0-9181-45DB-83AB-74B63C4644DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "488614FD-E4DF-4E6B-B928-444D98076F4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A638B5-5FBC-4193-879D-883CF2777200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE84A44-AAB5-4D3F-ADE5-617E58B14E68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "507272EC-6B90-46DA-9E9A-EF5DCB770E7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "5C74FA35-319D-4B10-868A-A6CFAD137978",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.30:*:*:*:*:*:*:*",
"matchCriteriaId": "C4C47A3C-D478-44E9-8183-735CF9CFBC2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "416DCB14-271A-4578-9AE7-418C75ADC4C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "FEBFCE3F-FE95-4559-A972-5241D48CB902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "0064F721-57E1-4AC4-A3C3-92E05B64F0F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "ED8A76A3-9CD8-4A3C-BDD4-53407A92E527",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "509DC30B-7D2F-43A7-9FD3-71FC405F520E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
},
{
"lang": "es",
"value": "El firmware Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 desde v2.30 hasta v2.51, cuando NAT esta activado, permite a atacantes remotos producir una denegaci\u00f3n de servicio (reinicio de sistema) a trav\u00e9s de paquetes GRE manipulados."
}
],
"id": "CVE-2009-4293",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-12-10T23:30:00.420",
"references": [
{
"source": "cve@mitre.org",
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"source": "cve@mitre.org",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/59361"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37154"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/59361"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37154"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-16"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2009-4292
Vulnerability from fkie_nvd - Published: 2009-12-10 23:30 - Updated: 2025-04-09 00:30| Vendor | Product | Version | |
|---|---|---|---|
| iij | seil\/x1_firmware | 2.40 | |
| iij | seil\/x1_firmware | 2.41 | |
| iij | seil\/x1_firmware | 2.42 | |
| iij | seil\/x1_firmware | 2.50 | |
| iij | seil\/x1_firmware | 2.51 | |
| iij | seil\/x1 | * | |
| iij | seil\/b1_firmware | 2.40 | |
| iij | seil\/b1_firmware | 2.41 | |
| iij | seil\/b1_firmware | 2.42 | |
| iij | seil\/b1_firmware | 2.50 | |
| iij | seil\/b1_firmware | 2.51 | |
| iij | seil\/b1 | * | |
| iij | seil\/x2_firmware | 2.40 | |
| iij | seil\/x2_firmware | 2.41 | |
| iij | seil\/x2_firmware | 2.42 | |
| iij | seil\/x2_firmware | 2.50 | |
| iij | seil\/x2_firmware | 2.51 | |
| iij | seil\/x2 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "23564CCD-7EF3-4457-99FB-BFE966D35D5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "BD52B307-EA12-48FC-ACD5-01AEDED44A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "36F1D4E9-40BB-4BA6-9C44-5E06C8D98291",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "FF6EC374-64D2-4990-A4C4-86529CCF27C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "DAAA887F-7944-4C31-A191-0A39BC4E6544",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A63E557-3BA6-4E0E-8597-BAA112B21DEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "488614FD-E4DF-4E6B-B928-444D98076F4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "B6A638B5-5FBC-4193-879D-883CF2777200",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE84A44-AAB5-4D3F-ADE5-617E58B14E68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "507272EC-6B90-46DA-9E9A-EF5DCB770E7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/b1_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "5C74FA35-319D-4B10-868A-A6CFAD137978",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/b1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BE3BBD4-FB2E-4543-9149-0452B26FAC31",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.40:*:*:*:*:*:*:*",
"matchCriteriaId": "416DCB14-271A-4578-9AE7-418C75ADC4C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.41:*:*:*:*:*:*:*",
"matchCriteriaId": "FEBFCE3F-FE95-4559-A972-5241D48CB902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.42:*:*:*:*:*:*:*",
"matchCriteriaId": "0064F721-57E1-4AC4-A3C3-92E05B64F0F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.50:*:*:*:*:*:*:*",
"matchCriteriaId": "ED8A76A3-9CD8-4A3C-BDD4-53407A92E527",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:iij:seil\\/x2_firmware:2.51:*:*:*:*:*:*:*",
"matchCriteriaId": "509DC30B-7D2F-43A7-9FD3-71FC405F520E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:iij:seil\\/x2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the URL filtering function in Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.40 through 2.51 allows remote attackers to execute arbitrary code via unspecified vectors."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer en la funci\u00f3n de filtrado de URL en el firmware Internet Initiative Japan SEIL/X1, SEIL/X2, y SEIL/B1 desde la v2.40 hasta la v2.51 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores sin especificar."
}
],
"id": "CVE-2009-4292",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2009-12-10T23:30:00.390",
"references": [
{
"source": "cve@mitre.org",
"url": "http://jvn.jp/en/jp/JVN06362164/index.html"
},
{
"source": "cve@mitre.org",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/59362"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37154"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN06362164/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000069.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/59362"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37154"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00669.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54051"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2015-0887 (GCVE-0-2015-0887)
Vulnerability from cvelistv5 – Published: 2015-02-28 02:00 – Updated: 2024-08-06 04:26- n/a
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:26:11.341Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01541.html"
},
{
"name": "JVNDB-2015-000031",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
},
{
"name": "JVN#63949115",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN63949115/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-02-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-02-28T02:57:00",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01541.html"
},
{
"name": "JVNDB-2015-000031",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
},
{
"name": "JVN#63949115",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN63949115/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-0887",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.seil.jp/support/security/a01541.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01541.html"
},
{
"name": "JVNDB-2015-000031",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
},
{
"name": "JVN#63949115",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN63949115/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2015-0887",
"datePublished": "2015-02-28T02:00:00",
"dateReserved": "2015-01-08T00:00:00",
"dateUpdated": "2024-08-06T04:26:11.341Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2004 (GCVE-0-2014-2004)
Vulnerability from cvelistv5 – Published: 2014-06-16 14:00 – Updated: 2024-08-06 09:58- n/a
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:58:16.188Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01443.html"
},
{
"name": "JVN#10724763",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN10724763/index.html"
},
{
"name": "JVNDB-2014-000055",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-06-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-06-16T14:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01443.html"
},
{
"name": "JVN#10724763",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN10724763/index.html"
},
{
"name": "JVNDB-2014-000055",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-2004",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.seil.jp/support/security/a01443.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01443.html"
},
{
"name": "JVN#10724763",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN10724763/index.html"
},
{
"name": "JVNDB-2014-000055",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2014-2004",
"datePublished": "2014-06-16T14:00:00",
"dateReserved": "2014-02-17T00:00:00",
"dateUpdated": "2024-08-06T09:58:16.188Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-4708 (GCVE-0-2013-4708)
Vulnerability from cvelistv5 – Published: 2013-10-01 17:00 – Updated: 2024-09-17 01:15- n/a
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:52:27.107Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01388.html"
},
{
"name": "JVN#40079308",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN40079308/index.html"
},
{
"name": "97619",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/97619"
},
{
"name": "JVNDB-2013-000091",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-10-01T17:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01388.html"
},
{
"name": "JVN#40079308",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN40079308/index.html"
},
{
"name": "97619",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/97619"
},
{
"name": "JVNDB-2013-000091",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-4708",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.seil.jp/support/security/a01388.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01388.html"
},
{
"name": "JVN#40079308",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN40079308/index.html"
},
{
"name": "97619",
"refsource": "OSVDB",
"url": "http://osvdb.org/97619"
},
{
"name": "JVNDB-2013-000091",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2013-4708",
"datePublished": "2013-10-01T17:00:00Z",
"dateReserved": "2013-06-26T00:00:00Z",
"dateUpdated": "2024-09-17T01:15:57.609Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-4709 (GCVE-0-2013-4709)
Vulnerability from cvelistv5 – Published: 2013-09-20 15:00 – Updated: 2024-09-16 17:58- n/a
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:52:27.122Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVN#43152129",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN43152129/index.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01396.html"
},
{
"name": "JVNDB-2013-000092",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-09-20T15:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVN#43152129",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN43152129/index.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01396.html"
},
{
"name": "JVNDB-2013-000092",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-4709",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#43152129",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN43152129/index.html"
},
{
"name": "http://www.seil.jp/support/security/a01396.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01396.html"
},
{
"name": "JVNDB-2013-000092",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2013-4709",
"datePublished": "2013-09-20T15:00:00Z",
"dateReserved": "2013-06-26T00:00:00Z",
"dateUpdated": "2024-09-16T17:58:50.809Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0454 (GCVE-0-2011-0454)
Vulnerability from cvelistv5 – Published: 2011-03-01 22:00 – Updated: 2024-08-06 21:51- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:08.946Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2011-000014",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"name": "JVN#88991166",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"name": "46598",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/46598"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"name": "43494",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43494"
},
{
"name": "seil-pppac-bo(65672)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVNDB-2011-000014",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"name": "JVN#88991166",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"name": "46598",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/46598"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"name": "43494",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43494"
},
{
"name": "seil-pppac-bo(65672)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2011-0454",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2011-000014",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"name": "JVN#88991166",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"name": "46598",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46598"
},
{
"name": "http://www.seil.jp/support/security/a01001.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"name": "43494",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43494"
},
{
"name": "seil-pppac-bo(65672)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2011-0454",
"datePublished": "2011-03-01T22:00:00",
"dateReserved": "2011-01-14T00:00:00",
"dateUpdated": "2024-08-06T21:51:08.946Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-4409 (GCVE-0-2009-4409)
Vulnerability from cvelistv5 – Published: 2009-12-23 21:00 – Updated: 2024-09-17 01:35- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T07:01:20.198Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "37628",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37628"
},
{
"name": "37293",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/37293"
},
{
"name": "JVN#49602378",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN49602378/index.html"
},
{
"name": "61118",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/61118"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00697.php"
},
{
"name": "JVNDB-2009-000079",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000079.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-12-23T21:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "37628",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37628"
},
{
"name": "37293",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/37293"
},
{
"name": "JVN#49602378",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN49602378/index.html"
},
{
"name": "61118",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/61118"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00697.php"
},
{
"name": "JVNDB-2009-000079",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000079.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-4409",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "37628",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37628"
},
{
"name": "37293",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37293"
},
{
"name": "JVN#49602378",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN49602378/index.html"
},
{
"name": "61118",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/61118"
},
{
"name": "http://www.seil.jp/seilseries/security/2009/a00697.php",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/seilseries/security/2009/a00697.php"
},
{
"name": "JVNDB-2009-000079",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000079.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-4409",
"datePublished": "2009-12-23T21:00:00Z",
"dateReserved": "2009-12-23T00:00:00Z",
"dateUpdated": "2024-09-17T01:35:32.632Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-4293 (GCVE-0-2009-4293)
Vulnerability from cvelistv5 – Published: 2009-12-10 23:00 – Updated: 2024-08-07 06:54- n/a
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T06:54:10.459Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ADV-2009-3111",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"name": "59361",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/59361"
},
{
"name": "JVNDB-2009-000070",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"name": "JVN#13011682",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"name": "seil-gre-dos(54050)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
},
{
"name": "37154",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37154"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-10-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "ADV-2009-3111",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"name": "59361",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/59361"
},
{
"name": "JVNDB-2009-000070",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"name": "JVN#13011682",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"name": "seil-gre-dos(54050)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
},
{
"name": "37154",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37154"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-4293",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Internet Initiative Japan SEIL/X1, SEIL/X2, and SEIL/B1 firmware 2.30 through 2.51, when NAT is enabled, allows remote attackers to cause a denial of service (system restart) via crafted GRE packets."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2009-3111",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/3111"
},
{
"name": "http://www.seil.jp/seilseries/security/2009/a00674.php",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/seilseries/security/2009/a00674.php"
},
{
"name": "59361",
"refsource": "OSVDB",
"url": "http://osvdb.org/59361"
},
{
"name": "JVNDB-2009-000070",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000070.html"
},
{
"name": "JVN#13011682",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN13011682/index.html"
},
{
"name": "seil-gre-dos(54050)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54050"
},
{
"name": "37154",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37154"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-4293",
"datePublished": "2009-12-10T23:00:00",
"dateReserved": "2009-12-10T00:00:00",
"dateUpdated": "2024-08-07T06:54:10.459Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2015-0887 (GCVE-0-2015-0887)
Vulnerability from nvd – Published: 2015-02-28 02:00 – Updated: 2024-08-06 04:26- n/a
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T04:26:11.341Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01541.html"
},
{
"name": "JVNDB-2015-000031",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
},
{
"name": "JVN#63949115",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN63949115/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2015-02-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-02-28T02:57:00",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01541.html"
},
{
"name": "JVNDB-2015-000031",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
},
{
"name": "JVN#63949115",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN63949115/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2015-0887",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "npppd in the PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 Fuji routers 1.00 through 3.30, SEIL/X1 routers 3.50 through 4.70, SEIL/X2 routers 3.50 through 4.70, and SEIL/B1 routers 3.50 through 4.70 allows remote attackers to cause a denial of service (infinite loop and device hang) via a crafted SSTP packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.seil.jp/support/security/a01541.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01541.html"
},
{
"name": "JVNDB-2015-000031",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000031"
},
{
"name": "JVN#63949115",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN63949115/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2015-0887",
"datePublished": "2015-02-28T02:00:00",
"dateReserved": "2015-01-08T00:00:00",
"dateUpdated": "2024-08-06T04:26:11.341Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2004 (GCVE-0-2014-2004)
Vulnerability from nvd – Published: 2014-06-16 14:00 – Updated: 2024-08-06 09:58- n/a
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:58:16.188Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01443.html"
},
{
"name": "JVN#10724763",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN10724763/index.html"
},
{
"name": "JVNDB-2014-000055",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-06-13T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-06-16T14:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01443.html"
},
{
"name": "JVN#10724763",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN10724763/index.html"
},
{
"name": "JVNDB-2014-000055",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-2004",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The PPP Access Concentrator (PPPAC) on SEIL SEIL/x86 routers 1.00 through 3.10, SEIL/X1 routers 1.00 through 4.50, SEIL/X2 routers 1.00 through 4.50, SEIL/B1 routers 1.00 through 4.50, SEIL/Turbo routers 1.80 through 2.17, and SEIL/neu 2FE Plus routers 1.80 through 2.17 allows remote attackers to cause a denial of service (session termination or concentrator outage) via a crafted TCP packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.seil.jp/support/security/a01443.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01443.html"
},
{
"name": "JVN#10724763",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN10724763/index.html"
},
{
"name": "JVNDB-2014-000055",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000055"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2014-2004",
"datePublished": "2014-06-16T14:00:00",
"dateReserved": "2014-02-17T00:00:00",
"dateUpdated": "2024-08-06T09:58:16.188Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-4708 (GCVE-0-2013-4708)
Vulnerability from nvd – Published: 2013-10-01 17:00 – Updated: 2024-09-17 01:15- n/a
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:52:27.107Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01388.html"
},
{
"name": "JVN#40079308",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN40079308/index.html"
},
{
"name": "97619",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/97619"
},
{
"name": "JVNDB-2013-000091",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-10-01T17:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01388.html"
},
{
"name": "JVN#40079308",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN40079308/index.html"
},
{
"name": "97619",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/97619"
},
{
"name": "JVNDB-2013-000091",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-4708",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://www.seil.jp/support/security/a01388.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01388.html"
},
{
"name": "JVN#40079308",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN40079308/index.html"
},
{
"name": "97619",
"refsource": "OSVDB",
"url": "http://osvdb.org/97619"
},
{
"name": "JVNDB-2013-000091",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2013-4708",
"datePublished": "2013-10-01T17:00:00Z",
"dateReserved": "2013-06-26T00:00:00Z",
"dateUpdated": "2024-09-17T01:15:57.609Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2013-4709 (GCVE-0-2013-4709)
Vulnerability from nvd – Published: 2013-09-20 15:00 – Updated: 2024-09-16 17:58- n/a
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:52:27.122Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVN#43152129",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN43152129/index.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01396.html"
},
{
"name": "JVNDB-2013-000092",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2013-09-20T15:00:00Z",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVN#43152129",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN43152129/index.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01396.html"
},
{
"name": "JVNDB-2013-000092",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2013-4709",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware before 2.82, SEIL/X1 with firmware before 4.32, SEIL/X2 with firmware before 4.32, SEIL/B1 with firmware before 4.32, SEIL/Turbo with firmware before 2.16, and SEIL/neu 2FE Plus with firmware before 2.16 allows remote attackers to execute arbitrary code via a crafted L2TP message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#43152129",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN43152129/index.html"
},
{
"name": "http://www.seil.jp/support/security/a01396.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01396.html"
},
{
"name": "JVNDB-2013-000092",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2013-000092"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2013-4709",
"datePublished": "2013-09-20T15:00:00Z",
"dateReserved": "2013-06-26T00:00:00Z",
"dateUpdated": "2024-09-16T17:58:50.809Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2011-0454 (GCVE-0-2011-0454)
Vulnerability from nvd – Published: 2011-03-01 22:00 – Updated: 2024-08-06 21:51- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T21:51:08.946Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2011-000014",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"name": "JVN#88991166",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"name": "46598",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/46598"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"name": "43494",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/43494"
},
{
"name": "seil-pppac-bo(65672)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-02-28T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVNDB-2011-000014",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"name": "JVN#88991166",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"name": "46598",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/46598"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"name": "43494",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/43494"
},
{
"name": "seil-pppac-bo(65672)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2011-0454",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Buffer overflow in the PPP Access Concentrator (PPPAC) on the SEIL/x86 with firmware 1.00 through 1.61, SEIL/B1 with firmware 1.00 through 3.11, SEIL/X1 with firmware 1.00 through 3.11, SEIL/X2 with firmware 1.00 through 3.11, SEIL/Turbo with firmware 1.80 through 2.10, and SEIL/neu 2FE Plus with firmware 1.80 through 2.10 might allow remote attackers to execute arbitrary code via a PPPoE packet."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2011-000014",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2011-000014"
},
{
"name": "JVN#88991166",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN88991166/index.html"
},
{
"name": "46598",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/46598"
},
{
"name": "http://www.seil.jp/support/security/a01001.html",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/support/security/a01001.html"
},
{
"name": "43494",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/43494"
},
{
"name": "seil-pppac-bo(65672)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65672"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2011-0454",
"datePublished": "2011-03-01T22:00:00",
"dateReserved": "2011-01-14T00:00:00",
"dateUpdated": "2024-08-06T21:51:08.946Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2009-4409 (GCVE-0-2009-4409)
Vulnerability from nvd – Published: 2009-12-23 21:00 – Updated: 2024-09-17 01:35- n/a
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T07:01:20.198Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "37628",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37628"
},
{
"name": "37293",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/37293"
},
{
"name": "JVN#49602378",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN49602378/index.html"
},
{
"name": "61118",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/61118"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00697.php"
},
{
"name": "JVNDB-2009-000079",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000079.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2009-12-23T21:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "37628",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37628"
},
{
"name": "37293",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/37293"
},
{
"name": "JVN#49602378",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN49602378/index.html"
},
{
"name": "61118",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/61118"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/seilseries/security/2009/a00697.php"
},
{
"name": "JVNDB-2009-000079",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000079.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-4409",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "37628",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/37628"
},
{
"name": "37293",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/37293"
},
{
"name": "JVN#49602378",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN49602378/index.html"
},
{
"name": "61118",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/61118"
},
{
"name": "http://www.seil.jp/seilseries/security/2009/a00697.php",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/seilseries/security/2009/a00697.php"
},
{
"name": "JVNDB-2009-000079",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000079.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-4409",
"datePublished": "2009-12-23T21:00:00Z",
"dateReserved": "2009-12-23T00:00:00Z",
"dateUpdated": "2024-09-17T01:35:32.632Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}