Search criteria

6 vulnerabilities found for x2 by seil

VAR-201709-0222

Vulnerability from variot - Updated: 2023-12-18 13:43

SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device's encrypted communications via a specially crafted packet. The IPsec/IKE function in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing certain packets. Internet Initiative Japan Inc. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Internet Initiative Japan Inc. The following products and versions are affected: Internet Initiative Japan SEIL/X version 4.60 to 5.72; SEIL/B1 version 4.60 to 5.72; SEIL/x86 version 3.20 to 5.72; SEIL/BPV4 version 5.00 to 5.72

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201709-0222",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "bpv 4",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": "5.00"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": "5.72"
      },
      {
        "model": "x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": "3.20"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": "5.72"
      },
      {
        "model": "x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": "5.72"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": "4.60"
      },
      {
        "model": "bpv 4",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": "5.72"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": "4.60"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": "4.60"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": "5.72"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "4.60 to 5.72"
      },
      {
        "model": "seil/bpv4",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "5.00 to 5.72"
      },
      {
        "model": "seil/x",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "4.60 to 5.72"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "3.20 to 5.72"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-000222"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-10856"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-781"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:4.60:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:5.72:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:seil:b1:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:seil:bpv_4_firmware:5.72:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:seil:bpv_4_firmware:5.00:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:seil:bpv_4:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:seil:x1_firmware:4.60:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:seil:x1_firmware:5.72:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:seil:x1:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:seil:x2_firmware:4.60:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:seil:x2_firmware:5.72:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:seil:x2:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:seil:x86_fuji_firmware:3.20:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  },
                  {
                    "cpe23Uri": "cpe:2.3:o:seil:x86_fuji_firmware:5.72:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:seil:x86_fuji:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-10856"
      }
    ]
  },
  "cve": "CVE-2017-10856",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2017-000222",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "VHN-101220",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 2.2,
            "impactScore": 1.4,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "IPA",
            "availabilityImpact": "Low",
            "baseScore": 5.3,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2017-000222",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2017-10856",
            "trust": 1.0,
            "value": "LOW"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2017-000222",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201709-781",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-101220",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-101220"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-000222"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-10856"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-781"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL/X 4.60 to 5.72, SEIL/B1 4.60 to 5.72, SEIL/x86 3.20 to 5.72, SEIL/BPV4 5.00 to 5.72 allows remote attackers to cause a temporary failure of the device\u0027s encrypted communications via a specially crafted packet. The IPsec/IKE function in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing certain packets. Internet Initiative Japan Inc. reported this vulnerability to IPA to notify users of its solution through JVN. JPCERT/CC and Internet Initiative Japan Inc. The following products and versions are affected: Internet Initiative Japan SEIL/X version 4.60 to 5.72; SEIL/B1 version 4.60 to 5.72; SEIL/x86 version 3.20 to 5.72; SEIL/BPV4 version 5.00 to 5.72",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-10856"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-000222"
      },
      {
        "db": "VULHUB",
        "id": "VHN-101220"
      }
    ],
    "trust": 1.71
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-10856",
        "trust": 2.5
      },
      {
        "db": "JVN",
        "id": "JVN76692689",
        "trust": 2.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-000222",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-781",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-101220",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-101220"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-000222"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-10856"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-781"
      }
    ]
  },
  "id": "VAR-201709-0222",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-101220"
      }
    ],
    "trust": 0.52368742
  },
  "last_update_date": "2023-12-18T13:43:59.178000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Internet Initiative Japan Inc.",
        "trust": 0.8,
        "url": "http://www.seil.jp/support/security/a01811.html"
      },
      {
        "title": "Multiple Internet Initiative Japan SEIL Repair measures for series router security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=74953"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-000222"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-781"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-20",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-101220"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-10856"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "https://jvn.jp/en/jp/jvn76692689/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.seil.jp/support/security/a01811.html"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-10856"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-10856"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-101220"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-000222"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-10856"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-781"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-101220"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-000222"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-10856"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-781"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-09-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-101220"
      },
      {
        "date": "2017-09-11T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-000222"
      },
      {
        "date": "2017-09-15T17:29:00.383000",
        "db": "NVD",
        "id": "CVE-2017-10856"
      },
      {
        "date": "2017-09-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201709-781"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-101220"
      },
      {
        "date": "2018-02-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-000222"
      },
      {
        "date": "2019-10-03T00:03:26.223000",
        "db": "NVD",
        "id": "CVE-2017-10856"
      },
      {
        "date": "2019-10-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201709-781"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-781"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL Series routers vulnerable to denial-of-service (DoS)",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-000222"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201709-781"
      }
    ],
    "trust": 0.6
  }
}

VAR-201704-0902

Vulnerability from variot - Updated: 2023-12-18 13:19

SEIL/x86 Fuji 1.70 to 5.62, SEIL/BPV4 5.00 to 5.62, SEIL/X1 1.30 to 5.62, SEIL/X2 1.30 to 5.62, SEIL/B1 1.00 to 5.62 allows remote attackers to cause a denial of service via specially crafted IPv4 UDP packets. The DNS forwarder, the PPP Access Concentrator (L2TP) and the Measure(iPerf server) function in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing certain packets. Internet Initiative Japan Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Internet Initiative Japan Inc. coordinated under the Information Security Early Warning Partnership.Receiving a specially crafted SSTP packet may result in the device becoming unresponsive. The following products and versions are affected: SEIL/x86 Fuji versions 1.70 to 5.62, SEIL/BPV4 versions 5.00 to 5.62, SEIL/X1 versions 1.30 to 5.62, SEIL/X2 versions 1.30 to 5.62, SEIL/B1 versions 1.00 to 5.62

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201704-0902",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": null
      },
      {
        "model": "x86 fuji",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": null
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": null
      },
      {
        "model": "bpv 4",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": null
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": null
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 5.62"
      },
      {
        "model": "seil/bpv4",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "5.00 to 5.62"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.30 to 5.62"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.30 to 5.62"
      },
      {
        "model": "seil/x86 fuji",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.70 to 5.62"
      },
      {
        "model": "seil/b1",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.00,\u003c=5.62"
      },
      {
        "model": "seil/bpv4",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "5.00,\u003c=5.62"
      },
      {
        "model": "seil/x1",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.30,\u003c=5.62"
      },
      {
        "model": "seil/x2",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.30,\u003c=5.62"
      },
      {
        "model": "seil/x86 fuji",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "internet initiative",
        "version": "1.70,\u003c=5.62"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-07494"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-000071"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-2153"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-095"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:seil:x86_fuji_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:seil:x86_fuji:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:seil:bpv_4_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:seil:bpv_4:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:seil:x1_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:seil:x1:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:seil:x2_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:seil:x2:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:seil:b1:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-2153"
      }
    ]
  },
  "cve": "CVE-2017-2153",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2017-000071",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2017-07494",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-110356",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "IPA",
            "availabilityImpact": "Low",
            "baseScore": 5.3,
            "baseSeverity": "Medium",
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2017-000071",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2017-2153",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2017-000071",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-07494",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201705-095",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-110356",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-07494"
      },
      {
        "db": "VULHUB",
        "id": "VHN-110356"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-000071"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-2153"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-095"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL/x86 Fuji 1.70 to 5.62, SEIL/BPV4 5.00 to 5.62, SEIL/X1 1.30 to 5.62, SEIL/X2 1.30 to 5.62, SEIL/B1 1.00 to 5.62 allows remote attackers to cause a denial of service via specially crafted IPv4 UDP packets. The DNS forwarder, the PPP Access Concentrator (L2TP) and the Measure(iPerf server) function in SEIL Series routers provided by Internet Initiative Japan Inc. contain a denial-of-service (DoS) vulnerability due to a flaw in processing certain packets. Internet Initiative Japan Inc. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN. JPCERT/CC and Internet Initiative Japan Inc. coordinated under the Information Security Early Warning Partnership.Receiving a specially crafted SSTP packet may result in the device becoming unresponsive. The following products and versions are affected: SEIL/x86 Fuji versions 1.70 to 5.62, SEIL/BPV4 versions 5.00 to 5.62, SEIL/X1 versions 1.30 to 5.62, SEIL/X2 versions 1.30 to 5.62, SEIL/B1 versions 1.00 to 5.62",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-2153"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-000071"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-07494"
      },
      {
        "db": "VULHUB",
        "id": "VHN-110356"
      }
    ],
    "trust": 2.25
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-2153",
        "trust": 3.1
      },
      {
        "db": "JVN",
        "id": "JVN86171513",
        "trust": 2.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-000071",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-095",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-07494",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-110356",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-07494"
      },
      {
        "db": "VULHUB",
        "id": "VHN-110356"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-000071"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-2153"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-095"
      }
    ]
  },
  "id": "VAR-201704-0902",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-07494"
      },
      {
        "db": "VULHUB",
        "id": "VHN-110356"
      }
    ],
    "trust": 1.162307692
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-07494"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:19:31.815000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Information from Internet Initiative Japan Inc.",
        "trust": 0.8,
        "url": "http://www.seil.jp/support/security/a01783.html"
      },
      {
        "title": "Patch for Multiple Internet Initiative Japan Product Denial of Service Vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/94414"
      },
      {
        "title": "Multiple Internet Initiative Japan Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=69770"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-07494"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-000071"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-095"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-20",
        "trust": 1.1
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-110356"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-000071"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-2153"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://jvn.jp/en/jp/jvn86171513/index.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.seil.jp/support/security/a01783.html"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-2153"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2153"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-110356"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-000071"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-2153"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-095"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-07494"
      },
      {
        "db": "VULHUB",
        "id": "VHN-110356"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-000071"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-2153"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-095"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-05-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-07494"
      },
      {
        "date": "2017-04-28T00:00:00",
        "db": "VULHUB",
        "id": "VHN-110356"
      },
      {
        "date": "2017-04-19T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-000071"
      },
      {
        "date": "2017-04-28T16:59:02.060000",
        "db": "NVD",
        "id": "CVE-2017-2153"
      },
      {
        "date": "2017-04-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201705-095"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-05-17T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-07494"
      },
      {
        "date": "2017-05-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-110356"
      },
      {
        "date": "2017-06-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-000071"
      },
      {
        "date": "2017-05-11T15:19:27.933000",
        "db": "NVD",
        "id": "CVE-2017-2153"
      },
      {
        "date": "2017-05-03T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201705-095"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-095"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL Series routers vulnerable to denial-of-service (DoS)",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-000071"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "input validation",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201705-095"
      }
    ],
    "trust": 0.6
  }
}

VAR-201206-0410

Vulnerability from variot - Updated: 2023-12-18 12:31

SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session. SEIL series contain an issue where access permissions are not restricted. SEIL series are wireless LAN routers. SEIL series contain an issue where access permissions are not restricted.An attacker that can access the product's HTTP proxy may bypass restrictions such as the URL filter. The SEIL Router is a router from Japan's SEIL vendors. A security vulnerability exists in the SEIL Router that allows malicious users to bypass some security restrictions. There is an error in the HTTP-Proxy/Gateway function provided by the router. To successfully exploit the vulnerability, you need to set HTTP-Proxy and enable \"Application-Gateway\". SEIL routers are routers produced by SEIL manufacturers in Japan. A successful attack requires setting up an HTTP proxy and enabling an "Application Gateway". ----------------------------------------------------------------------

Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch


TITLE: SEIL Routers HTTP-Proxy/Gateway Functionality Security Bypass Vulnerability

SECUNIA ADVISORY ID: SA49365

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49365/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49365

RELEASE DATE: 2012-06-06

DISCUSS ADVISORY: http://secunia.com/advisories/49365/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/49365/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=49365

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: A vulnerability has been reported in SEIL routers, which can be exploited by malicious people to bypass certain security restrictions.

The vulnerability is caused due to an error within the HTTP-Proxy/Gateway functionality and can be exploited to e.g.

The vulnerability is reported in the following products and versions: * SEIL/x86 firmware versions 1.00 through 2.35. * SEIL/X1 firmware versions 2.30 through 3.75. * SEIL/X2 firmware versions 2.30 through 3.75. * SEIL/B1 firmware versions 2.30 through 3.75.

SOLUTION: Update to a fixed version.

Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: SEIL: http://www.seil.jp/support/security/a01232.html

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201206-0410",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "3.71"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "3.70"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "3.60"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "3.51"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "3.50"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "3.41"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "3.40"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "3.31"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "3.30"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "3.21"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "3.20"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "3.13"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "3.10"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "3.02"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "3.01"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "2.75"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "2.74"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "2.73"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "2.72"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "2.70"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "2.63"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "2.62"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "2.61"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "2.60"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "b1",
        "scope": "eq",
        "trust": 2.6,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": "3.30"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": "3.50"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": "3.70"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": "3.60"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": "3.31"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": "3.51"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": "3.41"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": "3.40"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": "3.31"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "seil",
        "version": "3.40"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.41"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.13"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.63"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.74"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.61"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.74"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.61"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.70"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.60"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.01"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.11"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.62"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.10"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.60"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.01"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.60"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.73"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.51"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.02"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.62"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.70"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.21"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.40"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.73"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.02"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.70"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.42"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.63"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.21"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.72"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.30"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.12"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.50"
      },
      {
        "model": "x86",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.72"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.10"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.71"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.20"
      },
      {
        "model": "x86",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "1.61"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.75"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.71"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.41"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.51"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.50"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.20"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.52"
      },
      {
        "model": "x2",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "3.13"
      },
      {
        "model": "x1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "seil",
        "version": "2.75"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "2.30 to 3.75"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "2.30 to 3.75"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "2.30 to 3.75"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "internet initiative",
        "version": "1.00 to 2.35"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "seil",
        "version": "1.00"
      },
      {
        "model": "seil/x86",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "seil",
        "version": "2.35"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/x1",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/x2",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "seil",
        "version": "2.30"
      },
      {
        "model": "seil/b1",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "seil",
        "version": "3.75"
      },
      {
        "model": "",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x861.61"
      },
      {
        "model": "",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x861.00"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x23.75"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x23.71"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x23.70"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x23.60"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x23.51"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x23.50"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x23.41"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x23.40"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x23.31"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x23.30"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x23.21"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x23.20"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x23.13"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x23.12"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x23.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x23.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x23.02"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x23.01"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x22.75"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x22.74"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x22.73"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x22.72"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x22.70"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x22.63"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x22.62"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x22.61"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x22.60"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x22.52"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x22.51"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x22.50"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x22.42"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x22.41"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x22.40"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x22.30"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x13.75"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x13.71"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x13.70"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x13.60"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x13.51"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x13.50"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x13.41"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x13.40"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x13.31"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x13.30"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x13.21"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x13.20"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x13.13"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x13.12"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x13.11"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x13.10"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x13.02"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x13.01"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x12.75"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x12.74"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x12.73"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x12.72"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x12.70"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x12.63"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x12.62"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x12.61"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x12.60"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x12.52"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x12.51"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x12.50"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x12.42"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x12.41"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x12.40"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.3,
        "vendor": "seil",
        "version": "x12.30"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-3059"
      },
      {
        "db": "BID",
        "id": "78183"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000059"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2632"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-074"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:seil:x86_firmware:1.00:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:x86_firmware:1.61:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:2.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:2.74:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:2.75:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:3.01:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:3.02:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:3.60:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:3.70:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:3.71:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:3.75:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:2.73:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:2.74:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:2.75:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:3.01:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:3.60:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:3.70:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:3.71:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:3.75:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:2.72:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:2.73:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:2.74:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:2.75:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:3.01:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:3.51:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:3.60:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:3.70:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:3.75:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:2.51:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:2.52:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:2.60:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:2.61:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:3.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:3.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:3.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:3.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:2.51:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:2.52:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:2.60:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:2.61:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:3.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:3.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:3.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:3.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:3.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:2.50:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:2.51:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:2.52:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:2.60:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:3.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:3.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:3.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:3.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.42:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.50:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.51:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.52:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.60:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.21:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:2.40:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:2.42:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:2.63:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:2.72:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:3.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:3.13:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:3.40:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:3.50:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:2.40:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:2.42:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:2.63:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:2.72:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:3.02:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:3.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:3.40:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:3.50:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:2.40:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:2.42:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:2.61:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:2.63:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:3.02:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:3.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:3.40:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:3.50:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:3.71:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.40:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.61:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.63:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.02:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.40:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.50:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.75:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.72:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.73:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.74:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.75:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.51:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.60:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.70:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.71:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:2.41:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:2.50:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:2.62:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:2.70:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:2.73:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:3.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:3.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:3.41:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x1:3.51:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:2.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:2.41:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:2.50:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:2.62:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:2.70:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:3.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:3.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:3.41:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:x2:3.51:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:2.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:2.41:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:2.62:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:2.70:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:3.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:3.12:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:3.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:h:seil:b1:3.41:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.41:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.62:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:2.70:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.01:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:seil:b1_firmware:3.41:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-2632"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unknown",
    "sources": [
      {
        "db": "BID",
        "id": "78183"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2012-2632",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 4.9,
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "LOW",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "None",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2012-000059",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 4.9,
            "id": "VHN-55913",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "LOW",
            "trust": 0.1,
            "vectorString": "AV:N/AC:H/AU:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULMON",
            "availabilityImpact": "NONE",
            "baseScore": 2.6,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 4.9,
            "id": "CVE-2012-2632",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "LOW",
            "trust": 0.1,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2012-2632",
            "trust": 1.0,
            "value": "LOW"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2012-000059",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201206-074",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "VULHUB",
            "id": "VHN-55913",
            "trust": 0.1,
            "value": "LOW"
          },
          {
            "author": "VULMON",
            "id": "CVE-2012-2632",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-55913"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-2632"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000059"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2632"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-074"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session. SEIL series contain an issue where access permissions are not restricted. SEIL series are wireless LAN routers. SEIL series contain an issue where access permissions are not restricted.An attacker that can access the product\u0027s HTTP proxy may bypass restrictions such as the URL filter. The SEIL Router is a router from Japan\u0027s SEIL vendors. A security vulnerability exists in the SEIL Router that allows malicious users to bypass some security restrictions. There is an error in the HTTP-Proxy/Gateway function provided by the router. To successfully exploit the vulnerability, you need to set HTTP-Proxy and enable \\\"Application-Gateway\\\". SEIL routers are routers produced by SEIL manufacturers in Japan. A successful attack requires setting up an HTTP proxy and enabling an \"Application Gateway\". ----------------------------------------------------------------------\n\nBecome a PSI 3.0 beta tester!\nTest-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. \nDownload it here!\nhttp://secunia.com/psi_30_beta_launch\n\n----------------------------------------------------------------------\n\nTITLE:\nSEIL Routers HTTP-Proxy/Gateway Functionality Security Bypass\nVulnerability\n\nSECUNIA ADVISORY ID:\nSA49365\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/49365/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49365\n\nRELEASE DATE:\n2012-06-06\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/49365/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/49365/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49365\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in SEIL routers, which can be\nexploited by malicious people to bypass certain security\nrestrictions. \n\nThe vulnerability is caused due to an error within the\nHTTP-Proxy/Gateway functionality and can be exploited to e.g. \n\nThe vulnerability is reported in the following products and\nversions:\n* SEIL/x86 firmware versions 1.00 through 2.35. \n* SEIL/X1 firmware versions 2.30 through 3.75. \n* SEIL/X2 firmware versions 2.30 through 3.75. \n* SEIL/B1 firmware versions 2.30 through 3.75. \n\nSOLUTION:\nUpdate to a fixed version. \n\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nSEIL:\nhttp://www.seil.jp/support/security/a01232.html\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-2632"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000059"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3059"
      },
      {
        "db": "BID",
        "id": "78183"
      },
      {
        "db": "VULHUB",
        "id": "VHN-55913"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-2632"
      },
      {
        "db": "PACKETSTORM",
        "id": "113468"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-2632",
        "trust": 3.5
      },
      {
        "db": "JVN",
        "id": "JVN24646833",
        "trust": 2.9
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000059",
        "trust": 2.9
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-074",
        "trust": 0.7
      },
      {
        "db": "SECUNIA",
        "id": "49365",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3059",
        "trust": 0.6
      },
      {
        "db": "NSFOCUS",
        "id": "19754",
        "trust": 0.6
      },
      {
        "db": "JVN",
        "id": "JVN#24646833",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "78183",
        "trust": 0.5
      },
      {
        "db": "VULHUB",
        "id": "VHN-55913",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-2632",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "113468",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-3059"
      },
      {
        "db": "VULHUB",
        "id": "VHN-55913"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-2632"
      },
      {
        "db": "BID",
        "id": "78183"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000059"
      },
      {
        "db": "PACKETSTORM",
        "id": "113468"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2632"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-074"
      }
    ]
  },
  "id": "VAR-201206-0410",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-3059"
      },
      {
        "db": "VULHUB",
        "id": "VHN-55913"
      }
    ],
    "trust": 1.205265565
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-3059"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:31:13.884000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Internet Initiative Japan Inc. website",
        "trust": 0.8,
        "url": "http://www.seil.jp/support/security/a01232.html"
      },
      {
        "title": "SEIL Routers HTTP-Proxy/Gateway feature security bypass vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/17812"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-3059"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000059"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-264",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000059"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2632"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.9,
        "url": "http://jvn.jp/en/jp/jvn24646833/index.html"
      },
      {
        "trust": 2.2,
        "url": "http://www.seil.jp/support/security/a01232.html"
      },
      {
        "trust": 2.1,
        "url": "http://jvndb.jvn.jp/jvndb/jvndb-2012-000059"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2632"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2632"
      },
      {
        "trust": 0.6,
        "url": "http://www.seil.jp/support/security/a01232.htmlhttp"
      },
      {
        "trust": 0.6,
        "url": "http://secunia.com/advisories/49365"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/19754"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.securityfocus.com/bid/78183"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/psi_30_beta_launch"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/49365/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/49365/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49365"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-3059"
      },
      {
        "db": "VULHUB",
        "id": "VHN-55913"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-2632"
      },
      {
        "db": "BID",
        "id": "78183"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000059"
      },
      {
        "db": "PACKETSTORM",
        "id": "113468"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2632"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-074"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-3059"
      },
      {
        "db": "VULHUB",
        "id": "VHN-55913"
      },
      {
        "db": "VULMON",
        "id": "CVE-2012-2632"
      },
      {
        "db": "BID",
        "id": "78183"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000059"
      },
      {
        "db": "PACKETSTORM",
        "id": "113468"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-2632"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-074"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-06-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-3059"
      },
      {
        "date": "2012-06-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-55913"
      },
      {
        "date": "2012-06-15T00:00:00",
        "db": "VULMON",
        "id": "CVE-2012-2632"
      },
      {
        "date": "2012-06-15T00:00:00",
        "db": "BID",
        "id": "78183"
      },
      {
        "date": "2012-06-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-000059"
      },
      {
        "date": "2012-06-11T01:01:35",
        "db": "PACKETSTORM",
        "id": "113468"
      },
      {
        "date": "2012-06-15T19:55:01.530000",
        "db": "NVD",
        "id": "CVE-2012-2632"
      },
      {
        "date": "2012-06-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201206-074"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-06-08T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-3059"
      },
      {
        "date": "2012-06-18T00:00:00",
        "db": "VULHUB",
        "id": "VHN-55913"
      },
      {
        "date": "2012-06-18T00:00:00",
        "db": "VULMON",
        "id": "CVE-2012-2632"
      },
      {
        "date": "2012-06-15T00:00:00",
        "db": "BID",
        "id": "78183"
      },
      {
        "date": "2012-06-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-000059"
      },
      {
        "date": "2012-06-18T04:00:00",
        "db": "NVD",
        "id": "CVE-2012-2632"
      },
      {
        "date": "2012-06-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201206-074"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201206-074"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SEIL series fail to restrict access permissions",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-000059"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Access Validation Error",
    "sources": [
      {
        "db": "BID",
        "id": "78183"
      }
    ],
    "trust": 0.3
  }
}

FKIE_CVE-2012-2632

Vulnerability from fkie_nvd - Published: 2012-06-15 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session.
Impacted products
Vendor Product Version
seil b1 2.30
seil b1 2.40
seil b1 2.41
seil b1 2.42
seil b1 2.50
seil b1 2.51
seil b1 2.52
seil b1 2.60
seil b1 2.61
seil b1 2.62
seil b1 2.63
seil b1 2.70
seil b1 2.72
seil b1 2.73
seil b1 2.74
seil b1 2.75
seil b1 3.01
seil b1 3.02
seil b1 3.10
seil b1 3.11
seil b1 3.12
seil b1 3.13
seil b1 3.20
seil b1 3.21
seil b1 3.30
seil b1 3.31
seil b1 3.40
seil b1 3.41
seil b1 3.50
seil b1 3.51
seil b1 3.60
seil b1 3.70
seil b1 3.71
seil b1 3.75
seil x1 2.30
seil x1 2.40
seil x1 2.41
seil x1 2.42
seil x1 2.50
seil x1 2.51
seil x1 2.52
seil x1 2.60
seil x1 2.61
seil x1 2.62
seil x1 2.63
seil x1 2.70
seil x1 2.72
seil x1 2.73
seil x1 2.74
seil x1 2.75
seil x1 3.01
seil x1 3.02
seil x1 3.10
seil x1 3.11
seil x1 3.12
seil x1 3.13
seil x1 3.20
seil x1 3.21
seil x1 3.30
seil x1 3.31
seil x1 3.40
seil x1 3.41
seil x1 3.50
seil x1 3.51
seil x1 3.60
seil x1 3.70
seil x1 3.71
seil x1 3.75
seil x2 2.30
seil x2 2.40
seil x2 2.41
seil x2 2.42
seil x2 2.50
seil x2 2.51
seil x2 2.52
seil x2 2.60
seil x2 2.61
seil x2 2.62
seil x2 2.63
seil x2 2.70
seil x2 2.72
seil x2 2.73
seil x2 2.74
seil x2 2.75
seil x2 3.01
seil x2 3.02
seil x2 3.10
seil x2 3.11
seil x2 3.12
seil x2 3.13
seil x2 3.20
seil x2 3.21
seil x2 3.30
seil x2 3.31
seil x2 3.40
seil x2 3.41
seil x2 3.50
seil x2 3.51
seil x2 3.60
seil x2 3.70
seil x2 3.71
seil x2 3.75
seil b1_firmware 2.30
seil b1_firmware 2.40
seil b1_firmware 2.41
seil b1_firmware 2.42
seil b1_firmware 2.50
seil b1_firmware 2.51
seil b1_firmware 2.52
seil b1_firmware 2.60
seil b1_firmware 2.61
seil b1_firmware 2.62
seil b1_firmware 2.63
seil b1_firmware 2.70
seil b1_firmware 2.72
seil b1_firmware 2.73
seil b1_firmware 2.74
seil b1_firmware 2.75
seil b1_firmware 3.01
seil b1_firmware 3.02
seil b1_firmware 3.10
seil b1_firmware 3.11
seil b1_firmware 3.12
seil b1_firmware 3.13
seil b1_firmware 3.20
seil b1_firmware 3.21
seil b1_firmware 3.30
seil b1_firmware 3.31
seil b1_firmware 3.40
seil b1_firmware 3.41
seil b1_firmware 3.50
seil b1_firmware 3.51
seil b1_firmware 3.60
seil b1_firmware 3.70
seil b1_firmware 3.71
seil b1_firmware 3.75
seil x86_firmware 1.00
seil x86_firmware 1.61

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:seil:b1:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "363148D7-E3C5-476F-888C-31692F73FC1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "18A4E9AC-64A9-4585-8889-75B885FA8359",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF7C5C45-6A98-4DB4-9EC7-6426254CF3AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CF3E2DD-A82F-4D27-80AA-57DE4C835E3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "6322C3D4-0B01-474E-9265-35AF4DD516EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "982534C1-C167-4CBB-A56E-513F356CC994",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "41399354-E237-4A2A-9B6B-E63B2662E3DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C7E15A3-19B8-45E2-B856-8F28CC8C280C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "676E5932-66E5-4FAB-855F-98C5F94A19EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9BBC9C8-9C8B-41BD-8BD5-785AC85E1FC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "E07EF718-826D-4AC4-8C86-D44A29AA78AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "0922B5D6-8B08-42AB-BD3E-DE5F38EFF6EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CC6A6EB-9D10-4DB4-B9ED-9D00DEF96EBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "374821DE-C0BE-4C68-8B6C-B4B07EF1C46C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "05324D90-B60E-40A2-89C4-B5142C066021",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:2.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "16444EF8-690E-4255-A60E-51D741A8F54E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "81EBF6C1-A32B-46DC-9612-C2FE1ABF2627",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1289B41-28A4-41D3-A092-9F76B1AF6834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA846901-03C5-48C6-8B03-BD8A4E92E251",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2180323C-228A-4C29-927E-C19CEE807F40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "712DD1DC-4191-4B68-9B9B-E9BDE5B114CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7224DC-86EB-4876-8D8D-B907165D5EF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D2D9907-DEA8-445F-9842-538E31DAE63C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "51531ED0-3C36-46D1-9F94-66CA9A98964F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB02717B-B93F-4FA6-91ED-18A15ED39529",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9492E49-4914-4165-8406-CD409B9533A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AE3B68F-B637-4FE4-9942-7D6A0EAE3C92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "14BED143-E85C-4B8F-8630-35080A911E0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "15179500-7194-4663-B601-A99468F8E1F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "D41BECF5-8E3C-464E-B64D-13B61623F83E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "054CDEC9-4F71-415A-98C8-5D36893A4CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "512BE46D-0D0F-432C-B3D3-F8C43A40945A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "37BEE6BB-FB53-44C2-B8F6-26028D90ADF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:b1:3.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "E635DC32-BCA3-40D8-9D53-A216E1A008C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "0353B874-9EFA-41E1-9E53-040A4B778D79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E20904-51CE-48E1-A61D-17E13B85D57D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3929172-60B4-4AE0-B80A-290F1F653A9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "89392531-4DBE-437E-AF7D-3044CA638E86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "67A26C6C-FF23-41E0-92F0-60BF9E603162",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D46283-9927-4116-8B1A-964D90927872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "80694620-F1A1-4EAB-8BEF-89FC2D8AA871",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "B32A7AF0-89D1-4636-9DF4-030607B3E6CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBBB00AD-5B6A-4C6A-A55D-741509B8F5D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8E4BED3-867C-4500-978C-6A1950583C42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5FCC542-1794-4923-9C0B-448578E40BB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E011DE1-BC94-4D2A-99FF-097857A28198",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "23537089-9AEE-43A6-868C-6A14A6E1A1A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAAE376E-9AAB-4FC4-8330-4BE2656EB38F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "22DABCCB-7DD9-48FF-9949-219DB1C86AFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:2.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "9699AE15-D7A1-4293-87CD-03382DA26B48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD32FB4-D5CA-4B8E-9530-582774920E7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCD232C0-E29A-4E4A-A705-3DDCAE34649D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8908E10F-DDF6-44E4-A93E-9C2DEA9078DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BCED1B7-5B94-42B6-B831-0A4D0E7C9796",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "107327B7-5C33-4195-959C-CDA39633C4E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C65BE6D4-403C-47B6-8CD3-A88CE8794A55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA81178C-ECF1-47F1-977A-8DBAD5AD2528",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "C507FAEB-9EDD-449A-A22A-754F582023B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDF2F222-3FEA-4D66-953D-2FC297C5F6CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C8340D-C338-400B-B934-42BAECC9C20E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB311CAE-FE73-4FC5-B949-3CAA9D59AFFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "290C1676-56DA-472D-9CAD-5B87760974B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1860271-BCDB-448D-8D79-D602FEEC634A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "F956482A-BFEC-4285-B85F-11CA56D97AAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BD2FCCD-AFED-4C14-9C59-13B123385363",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6CF63B4-8D0C-40A5-8734-B4988AF8EB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF1EB48B-CEB3-42CA-B3C0-6F0B06789C79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x1:3.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD398D0C-E533-4EE0-A55E-39A868699867",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "10FF138F-0A19-4D2F-9C7C-12303A533875",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "7860C101-A585-4D26-8D65-0B04154245C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB8560EC-4A12-4792-BDCB-FA3B8972ED69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0B3278B-CA7E-4043-B39B-B6B04605634B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "82D58786-6929-4BAB-91B2-67AECCEC65EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4E5D48B-E84A-4759-9F87-0EF60352DE14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6C96023-017B-4880-93CD-75CA522A6107",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4267653-44FD-48F2-A838-322295CD2A34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "A09D1A20-52F5-4D80-B00A-C1DF369D72B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "05E1455D-22CC-41F4-A5BD-63D91EE5C748",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "1925D84D-569A-4BFB-AE03-18FEA3DDD271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6D358F4-8B0B-4812-8CDA-74F3731EA501",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "C83BE04D-69BC-4F62-A4C1-A65B762476E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD22078-BA28-43A8-8169-F167AD13D905",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "13D20BF2-99E7-4C91-9B51-4E5A5637BED8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:2.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C889686-9E23-44ED-B376-3932803A4057",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30E7E09-A8BB-442F-8CEA-7BCFBE53D48F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFF9EAFE-8906-404C-BBED-0852FCA82B16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "429F239F-B545-4FDF-A332-136693E85996",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "88D9D5B9-7048-4933-9657-310FBD1017EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F59D213-0FC6-4C78-8D72-3030738423A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3CC3640-4849-4E4E-A377-93DD27F22184",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "623908C5-F1DA-45FB-A3C6-6541E40D13A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B400B72-9F2D-43BF-A5BD-63E2B07A4E0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "893FEBFD-CF10-4F27-81C1-8B61462534B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "8850E165-5E32-4F86-B77D-158C8529F252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C91A039-AC46-40B8-8106-02ADC3ED44AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C392849-4425-42B9-A384-19F0F9EDD958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "A66AF10E-4CC5-4BF1-BA9E-EA89B988C7C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3E6BAF2-0C3F-4996-8932-673E21C73CF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A67D5EA-AEA6-4E29-9B82-499BA54F1319",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "55AFD5DD-5EAF-4347-B58C-AC7F376DE90F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FE96121-D65D-4AD4-B779-EBF243507710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:seil:x2:3.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "2334DAE0-E647-4395-9CB6-5A42A753C9B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "78551AE9-F930-4643-8C63-9A4E6F6AC37A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D5515A0-59A3-48D3-886B-1A521C87945D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "298A5A1E-0053-4F79-8EC6-CA039172CB9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.42:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CDDF455-121C-45ED-8E94-D88271513938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E0C5E1-DD68-4428-BFAC-AC4713CE1D9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDB2021-AC8E-473C-9DEE-08DDC07B3E4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.52:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C930C4-B8B4-40A6-BC75-16B1C426EA9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "6692E733-DFF0-48FE-95AE-6401F582384C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A3BE6F6-F586-49A1-83BD-D45AB1DAE556",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.62:*:*:*:*:*:*:*",
              "matchCriteriaId": "EADA6D53-F16E-4BC5-90DA-0CEED1F14B7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.63:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AD875EC-54CE-43D2-9642-B8F6AD94FE82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EF099B1-85D3-44A6-9CE0-8436B0D80CD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "B379EFA5-926B-4E5F-B350-FEB23694244D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DCC773D-352E-4B2B-8D0B-9767CA38AD7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "87ABDD31-2BCE-44EF-81C6-0155B73EC4F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:2.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "46139215-3BFF-4869-88AA-BAA3BBDE2F99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2C2B7C7-501A-42FD-BB10-AB5118B10B74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "C381A9EF-B6BC-42BB-A5A4-C199670126F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "197B7157-4122-486B-A306-CA60D3F546FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A707B39-F82A-47EF-A35A-CC87C63A948B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "97D870A8-EA7E-44C7-9277-37413BFA3FF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E7133D-17A5-43B3-8E56-9E6082C1CAB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A75EB6A-FE34-4A15-86F6-7AC14BAC956C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DBE0714-B263-4642-8A65-C96FCCDBA3F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5985C29-C438-45C8-B824-8EFD67FC6B03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "720C7F1E-C3B8-4D73-8470-197074C3D344",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "27FFE1C2-EB16-494C-BB15-7CC2799AABF1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.41:*:*:*:*:*:*:*",
              "matchCriteriaId": "84DECA7D-1D49-4FB5-91C9-2345948544D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.50:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA94CE8-D10E-4740-959F-91A0D26BB613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.51:*:*:*:*:*:*:*",
              "matchCriteriaId": "B97F9240-6168-492B-9357-C750281FC6F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.60:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A521DC6-D80C-46B3-8C60-364FD411B792",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.70:*:*:*:*:*:*:*",
              "matchCriteriaId": "040FF640-1303-4EDB-A356-9C1C8B23DE64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4537E1A-EC42-47BB-987E-8DA9F57F1FC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:b1_firmware:3.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FF343DB-D6D0-48A9-9225-56AFA6C632D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:x86_firmware:1.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAEE5507-E177-41CC-B95F-1003CF795DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:seil:x86_firmware:1.61:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDFF5DBD-22A3-4111-A7C8-98AE409B839C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session."
    },
    {
      "lang": "es",
      "value": "Los routers SEIL con firmware SEIL/x86 1.00 hasta la 2.35, SEIL/X1 2.30 hasta la 3.75, SEIL/X2 2.30 hasta la 3.75, y SEIL/B1 2.30 hasta la 3.75, si las funcionalidades http-proxy y application-gateway est\u00e1n activas, no manejan apropiadamente el comando CONNECT, lo que permite a atacantes remotos evitar las restricciones previstas de URL a trav\u00e9s de una sesi\u00f3n TCP."
    }
  ],
  "id": "CVE-2012-2632",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-06-15T19:55:01.530",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN24646833/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.seil.jp/support/security/a01232.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN24646833/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.seil.jp/support/security/a01232.html"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2012-2632 (GCVE-0-2012-2632)

Vulnerability from cvelistv5 – Published: 2012-06-15 19:00 – Updated: 2024-09-16 17:34
VLAI?
Summary
SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN24646833/index.html third-party-advisoryx_refsource_JVN
http://www.seil.jp/support/security/a01232.html x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:31.953Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVNDB-2012-000059",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
          },
          {
            "name": "JVN#24646833",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN24646833/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01232.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-06-15T19:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVNDB-2012-000059",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
        },
        {
          "name": "JVN#24646833",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN24646833/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01232.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2012-2632",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVNDB-2012-000059",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
            },
            {
              "name": "JVN#24646833",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN24646833/index.html"
            },
            {
              "name": "http://www.seil.jp/support/security/a01232.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01232.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2012-2632",
    "datePublished": "2012-06-15T19:00:00Z",
    "dateReserved": "2012-05-14T00:00:00Z",
    "dateUpdated": "2024-09-16T17:34:25.260Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-2632 (GCVE-0-2012-2632)

Vulnerability from nvd – Published: 2012-06-15 19:00 – Updated: 2024-09-16 17:34
VLAI?
Summary
SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN24646833/index.html third-party-advisoryx_refsource_JVN
http://www.seil.jp/support/security/a01232.html x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:42:31.953Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVNDB-2012-000059",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
          },
          {
            "name": "JVN#24646833",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN24646833/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01232.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-06-15T19:00:00Z",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVNDB-2012-000059",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
        },
        {
          "name": "JVN#24646833",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN24646833/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01232.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2012-2632",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVNDB-2012-000059",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059"
            },
            {
              "name": "JVN#24646833",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN24646833/index.html"
            },
            {
              "name": "http://www.seil.jp/support/security/a01232.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01232.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2012-2632",
    "datePublished": "2012-06-15T19:00:00Z",
    "dateReserved": "2012-05-14T00:00:00Z",
    "dateUpdated": "2024-09-16T17:34:25.260Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}