Vulnerability CVE-2010-2363


Published: 2010-08-30   Modified: 2012-02-13

Description:
The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address.

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.8/10
4.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
None
Affected software
IIJ -> Seil/b1 firmware 
IIJ -> Seil/x1 firmware 
IIJ -> Seil/x2 firmware 

 References:
http://xforce.iss.net/xforce/xfdb/61382
http://www.seil.jp/seilseries/security/2010/a00875.php
http://secunia.com/advisories/41088
http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html
http://jvn.jp/en/jp/JVN12683004/index.html

Copyright 2024, cxsecurity.com

 

Back to Top