JVNDB-2013-000091
Vulnerability from jvndb - Published: 2013-09-20 14:52 - Updated:2013-10-08 15:36Summary
SEIL Series routers vulnerable in RADIUS authentication
Details
SEIL Series routers contain a vulnerability in RADIUS authentication.
The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contains an issue when generating random numbers used for RADIUS authentication, which may result in the generated random numbers to be easily predicted.
References
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000091.html",
"dc:date": "2013-10-08T15:36+09:00",
"dcterms:issued": "2013-09-20T14:52+09:00",
"dcterms:modified": "2013-10-08T15:36+09:00",
"description": "SEIL Series routers contain a vulnerability in RADIUS authentication.\r\n\r\nThe PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contains an issue when generating random numbers used for RADIUS authentication, which may result in the generated random numbers to be easily predicted.",
"link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000091.html",
"sec:cpe": [
{
"#text": "cpe:/h:iij:seil%2Fb1",
"@product": "SEIL/B1",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:iij:seil%2Fneu_2fe_plus",
"@product": "SEIL/neu 2FE Plus",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:iij:seil%2Fturbo",
"@product": "SEIL/Turbo",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:iij:seil%2Fx1",
"@product": "SEIL/X1",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:iij:seil%2Fx2",
"@product": "SEIL/X2",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:iij:seil%2Fx86",
"@product": "SEIL/x86",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:iij:seil%252fb1_firmware",
"@product": "SEIL/B1 firmware",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:iij:seil%252fneu_2fe_plus_firmware",
"@product": "SEIL/neu 2FE Plus firmware",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:iij:seil%252fturbo_firmware",
"@product": "SEIL/Turbo firmware",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:iij:seil%252fx1_firmware",
"@product": "SEIL/X1 firmware",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:iij:seil%252fx2_firmware",
"@product": "SEIL/X2 firmware",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:iij:seil%252fx86_firmware",
"@product": "SEIL/x86 firmware",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
}
],
"sec:cvss": {
"@score": "4.0",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2013-000091",
"sec:references": [
{
"#text": "https://jvn.jp/en/jp/JVN40079308/",
"@id": "JVN#40079308",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4708",
"@id": "CVE-2013-4708",
"@source": "CVE"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4708",
"@id": "CVE-2013-4708",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-Other",
"@title": "No Mapping(CWE-Other)"
}
],
"title": "SEIL Series routers vulnerable in RADIUS authentication"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…