CVE-2010-2363 (GCVE-0-2010-2363)
Vulnerability from cvelistv5 – Published: 2010-08-30 19:00 – Updated: 2024-08-07 02:32
VLAI?
Summary
The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T02:32:16.315Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "seil-ipv6-spoofing(61382)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61382"
},
{
"name": "JVN#12683004",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN12683004/index.html"
},
{
"name": "JVNDB-2010-000032",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html"
},
{
"name": "41088",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/41088"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.seil.jp/seilseries/security/2010/a00875.php"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2010-08-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "seil-ipv6-spoofing(61382)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61382"
},
{
"name": "JVN#12683004",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN12683004/index.html"
},
{
"name": "JVNDB-2010-000032",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html"
},
{
"name": "41088",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/41088"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.seil.jp/seilseries/security/2010/a00875.php"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-2363",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "seil-ipv6-spoofing(61382)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61382"
},
{
"name": "JVN#12683004",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN12683004/index.html"
},
{
"name": "JVNDB-2010-000032",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html"
},
{
"name": "41088",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/41088"
},
{
"name": "http://www.seil.jp/seilseries/security/2010/a00875.php",
"refsource": "CONFIRM",
"url": "http://www.seil.jp/seilseries/security/2010/a00875.php"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2010-2363",
"datePublished": "2010-08-30T19:00:00",
"dateReserved": "2010-06-21T00:00:00",
"dateUpdated": "2024-08-07T02:32:16.315Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B23BF51-78E0-46B7-8288-16EB6C1D210C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"953C86E4-3E0F-4A75-BD27-EF8BE4F48894\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3D7717A-A3E4-45A8-A774-3C2855267FCE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7500641-D607-4221-ADA2-CBCC338F22A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21A290E5-32F5-42AE-BDE8-C92B84A44D01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACAB1F52-6BC3-418D-AC2A-F66C34B6E2DF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35BC7F97-3208-43EE-B931-A28CD9A3515F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C03EE30-DC89-4926-A1FF-F878B4F9E205\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90546F95-8BA1-4F13-86F4-91F797528281\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FA8842C-D4BF-4B8F-89EC-DAEE94AB8A12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.43:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9A47FE3-A7E3-41FF-81B2-A41CCB776924\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.44:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B75E486-B21A-4155-A4F8-155CD3A2EB59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7858BAD1-7CFD-4602-9BC4-E4FC82EA38DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFC463DA-EEBC-4D74-B7C5-3235C15DFBF0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E10BC7EF-5A3B-4026-9EDA-15061EBF814E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23564CCD-7EF3-4457-99FB-BFE966D35D5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD52B307-EA12-48FC-ACD5-01AEDED44A5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.42:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36F1D4E9-40BB-4BA6-9C44-5E06C8D98291\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF6EC374-64D2-4990-A4C4-86529CCF27C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DAAA887F-7944-4C31-A191-0A39BC4E6544\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35A5F2AA-23C4-43D4-B355-A9971503E3DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51EA78DB-5273-48F5-9350-EABAEE8FD79A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E805B146-572E-466E-BF0B-6B53970A72EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.62:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86AAEE2F-8D63-4167-A6C8-DAD2F235015D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.63:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C83696CE-91F3-4559-B16A-D1CF1C915515\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.70:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FF4C61B-393E-44E4-9404-BC331C8E8729\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.72:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF4E913E-1E8D-439B-8B77-35A54E42EC98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.73:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C75C2643-7F2A-4C34-94A0-DCB60399EF07\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:iij:seil\\\\/x1:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A63E557-3BA6-4E0E-8597-BAA112B21DEF\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3E85DA6-E3A3-43AA-8144-F1404DEB7F4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5CE87EF1-4EA4-4490-A3E7-BA911A5F37AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59204C16-8DC1-4BA0-9F73-560CC6D0E37B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22F3DFD4-AFDB-4F24-AB48-D03A64BE4AA0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4D9FA28-CFF2-4B84-90BC-A04C9E0C7BBC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3F5ABC9-271D-4E9A-A3E7-C53C1A96B8D0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A420F017-83DC-4029-A0F8-F50ED600CEA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2923D4A5-FD10-4846-B2F5-93C64DEB081E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D07EB84-D033-423B-AD53-D7B47DC508C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB31A5D1-6219-4E7D-965A-65C885C71C62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4383E0DF-E0D2-4E59-8053-CFD57F4C11C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.43:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25B9C033-965D-420F-8F71-C650592D5AE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.44:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CCB5982-5ECF-471C-8731-59AB4784055F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF907907-1E85-4F85-84ED-0DB73466186F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"429DBDFD-C32D-4888-BC36-FCE5896FC963\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4C47A3C-D478-44E9-8183-735CF9CFBC2A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"416DCB14-271A-4578-9AE7-418C75ADC4C7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEBFCE3F-FE95-4559-A972-5241D48CB902\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.42:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0064F721-57E1-4AC4-A3C3-92E05B64F0F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED8A76A3-9CD8-4A3C-BDD4-53407A92E527\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"509DC30B-7D2F-43A7-9FD3-71FC405F520E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"809E64CE-504D-49BB-8C76-09D95F814893\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE0DC6F5-9E0E-4FA9-A5A1-323229A8325A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B70D647-FEC1-4ED8-BF60-D3E9852DF4CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.62:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8FC22870-8A4A-483E-AA38-325E1564E4AA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.63:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07952D84-10F6-46D0-B896-89401F063888\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.70:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BB8C1C6-D47D-4A85-8997-9E356688DA24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.72:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07AB01A2-0CC3-49E6-B1A1-FF1BD918019E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:iij:seil\\\\/x2:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:1.00:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43F0BE07-FC42-4AB1-A553-1B254CC57D4E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.01:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1DADC38F-D530-49FC-A834-3BBC5FF71C27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8A3B3F1-3342-4F6B-A0CC-4A1A7D6E163F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F76EDD89-9C58-40BE-B7AE-72E82D051641\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CA0DBD0-9181-45DB-83AB-74B63C4644DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"488614FD-E4DF-4E6B-B928-444D98076F4A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6A638B5-5FBC-4193-879D-883CF2777200\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.42:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CCE84A44-AAB5-4D3F-ADE5-617E58B14E68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"507272EC-6B90-46DA-9E9A-EF5DCB770E7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C74FA35-319D-4B10-868A-A6CFAD137978\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62B1B7C9-70C7-456B-B8C3-FF9BFECF6B1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BAFEF605-5A5F-4738-9DE3-30F7CCA41B7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71B53A2B-FF57-42B1-957B-E01CC8DE087B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.62:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C0D8323-9921-415C-B47C-49A947068F68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.63:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EEBE6E5A-691F-46EF-B999-18ED949BF2A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.70:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11181F82-4A35-43AD-838E-E07092DF8652\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.72:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD9E04C4-EA46-4F14-A60B-12CAD9E98485\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:iij:seil\\\\/b1:*:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BE3BBD4-FB2E-4543-9149-0452B26FAC31\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address.\"}, {\"lang\": \"es\", \"value\": \"La implementaci\\u00f3n de la funcionalidad \\\"Reverse Path Forwarding\\\" (RPF) Unicast de IPv6 de los enrutadores SEIL/X1, SEIL/X2 y SEIL/B1 con firmware v1.00 hasta la v2.73, si el modo estricto (strict) es utilizado, no descarta apropiadamente paquetes, lo que puede permitir a atacantes remotos evitar las restricciones de acceso previstas a trav\\u00e9s de una direcci\\u00f3n IP falseada.\"}]",
"id": "CVE-2010-2363",
"lastModified": "2024-11-21T01:16:30.400",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:N\", \"baseScore\": 5.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 4.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2010-08-30T20:00:01.983",
"references": "[{\"url\": \"http://jvn.jp/en/jp/JVN12683004/index.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/41088\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.seil.jp/seilseries/security/2010/a00875.php\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/61382\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://jvn.jp/en/jp/JVN12683004/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/41088\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.seil.jp/seilseries/security/2010/a00875.php\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/61382\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2010-2363\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2010-08-30T20:00:01.983\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address.\"},{\"lang\":\"es\",\"value\":\"La implementaci\u00f3n de la funcionalidad \\\"Reverse Path Forwarding\\\" (RPF) Unicast de IPv6 de los enrutadores SEIL/X1, SEIL/X2 y SEIL/B1 con firmware v1.00 hasta la v2.73, si el modo estricto (strict) es utilizado, no descarta apropiadamente paquetes, lo que puede permitir a atacantes remotos evitar las restricciones de acceso previstas a trav\u00e9s de una direcci\u00f3n IP falseada.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:N\",\"baseScore\":5.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B23BF51-78E0-46B7-8288-16EB6C1D210C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"953C86E4-3E0F-4A75-BD27-EF8BE4F48894\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3D7717A-A3E4-45A8-A774-3C2855267FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7500641-D607-4221-ADA2-CBCC338F22A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21A290E5-32F5-42AE-BDE8-C92B84A44D01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACAB1F52-6BC3-418D-AC2A-F66C34B6E2DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35BC7F97-3208-43EE-B931-A28CD9A3515F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C03EE30-DC89-4926-A1FF-F878B4F9E205\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90546F95-8BA1-4F13-86F4-91F797528281\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FA8842C-D4BF-4B8F-89EC-DAEE94AB8A12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A47FE3-A7E3-41FF-81B2-A41CCB776924\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:1.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B75E486-B21A-4155-A4F8-155CD3A2EB59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7858BAD1-7CFD-4602-9BC4-E4FC82EA38DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFC463DA-EEBC-4D74-B7C5-3235C15DFBF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E10BC7EF-5A3B-4026-9EDA-15061EBF814E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23564CCD-7EF3-4457-99FB-BFE966D35D5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD52B307-EA12-48FC-ACD5-01AEDED44A5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36F1D4E9-40BB-4BA6-9C44-5E06C8D98291\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF6EC374-64D2-4990-A4C4-86529CCF27C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAAA887F-7944-4C31-A191-0A39BC4E6544\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35A5F2AA-23C4-43D4-B355-A9971503E3DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EA78DB-5273-48F5-9350-EABAEE8FD79A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E805B146-572E-466E-BF0B-6B53970A72EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86AAEE2F-8D63-4167-A6C8-DAD2F235015D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C83696CE-91F3-4559-B16A-D1CF1C915515\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FF4C61B-393E-44E4-9404-BC331C8E8729\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF4E913E-1E8D-439B-8B77-35A54E42EC98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x1_firmware:2.73:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C75C2643-7F2A-4C34-94A0-DCB60399EF07\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:iij:seil\\\\/x1:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A63E557-3BA6-4E0E-8597-BAA112B21DEF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E85DA6-E3A3-43AA-8144-F1404DEB7F4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CE87EF1-4EA4-4490-A3E7-BA911A5F37AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59204C16-8DC1-4BA0-9F73-560CC6D0E37B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22F3DFD4-AFDB-4F24-AB48-D03A64BE4AA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4D9FA28-CFF2-4B84-90BC-A04C9E0C7BBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3F5ABC9-271D-4E9A-A3E7-C53C1A96B8D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A420F017-83DC-4029-A0F8-F50ED600CEA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2923D4A5-FD10-4846-B2F5-93C64DEB081E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D07EB84-D033-423B-AD53-D7B47DC508C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB31A5D1-6219-4E7D-965A-65C885C71C62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4383E0DF-E0D2-4E59-8053-CFD57F4C11C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25B9C033-965D-420F-8F71-C650592D5AE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:1.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CCB5982-5ECF-471C-8731-59AB4784055F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF907907-1E85-4F85-84ED-0DB73466186F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"429DBDFD-C32D-4888-BC36-FCE5896FC963\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4C47A3C-D478-44E9-8183-735CF9CFBC2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"416DCB14-271A-4578-9AE7-418C75ADC4C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEBFCE3F-FE95-4559-A972-5241D48CB902\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0064F721-57E1-4AC4-A3C3-92E05B64F0F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED8A76A3-9CD8-4A3C-BDD4-53407A92E527\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"509DC30B-7D2F-43A7-9FD3-71FC405F520E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"809E64CE-504D-49BB-8C76-09D95F814893\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE0DC6F5-9E0E-4FA9-A5A1-323229A8325A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B70D647-FEC1-4ED8-BF60-D3E9852DF4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FC22870-8A4A-483E-AA38-325E1564E4AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07952D84-10F6-46D0-B896-89401F063888\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BB8C1C6-D47D-4A85-8997-9E356688DA24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/x2_firmware:2.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07AB01A2-0CC3-49E6-B1A1-FF1BD918019E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:iij:seil\\\\/x2:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF54D2DC-48BF-4E7D-BC33-1010B8DBF9E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:1.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43F0BE07-FC42-4AB1-A553-1B254CC57D4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DADC38F-D530-49FC-A834-3BBC5FF71C27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8A3B3F1-3342-4F6B-A0CC-4A1A7D6E163F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F76EDD89-9C58-40BE-B7AE-72E82D051641\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CA0DBD0-9181-45DB-83AB-74B63C4644DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"488614FD-E4DF-4E6B-B928-444D98076F4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6A638B5-5FBC-4193-879D-883CF2777200\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCE84A44-AAB5-4D3F-ADE5-617E58B14E68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"507272EC-6B90-46DA-9E9A-EF5DCB770E7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C74FA35-319D-4B10-868A-A6CFAD137978\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62B1B7C9-70C7-456B-B8C3-FF9BFECF6B1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAFEF605-5A5F-4738-9DE3-30F7CCA41B7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71B53A2B-FF57-42B1-957B-E01CC8DE087B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C0D8323-9921-415C-B47C-49A947068F68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEBE6E5A-691F-46EF-B999-18ED949BF2A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.70:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11181F82-4A35-43AD-838E-E07092DF8652\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:iij:seil\\\\/b1_firmware:2.72:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD9E04C4-EA46-4F14-A60B-12CAD9E98485\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:iij:seil\\\\/b1:*:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BE3BBD4-FB2E-4543-9149-0452B26FAC31\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/en/jp/JVN12683004/index.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/41088\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.seil.jp/seilseries/security/2010/a00875.php\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/61382\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://jvn.jp/en/jp/JVN12683004/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/41088\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.seil.jp/seilseries/security/2010/a00875.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/61382\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…