Vulnerability CVE-2012-2632


Published: 2012-06-15

Description:
SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session.

Type:

CWE-Other

CVSS2 => (AV:N/AC:H/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
2.6/10
2.9/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
SEIL -> B1 
SEIL -> X1 
SEIL -> X2 
SEIL -> B1 firmware 
SEIL -> X86 firmware 

 References:
http://www.seil.jp/support/security/a01232.html
http://jvndb.jvn.jp/jvndb/JVNDB-2012-000059
http://jvn.jp/en/jp/JVN24646833/index.html

Copyright 2024, cxsecurity.com

 

Back to Top