ID
VAR-201008-0452
TITLE
SEIL Routers IPv6 Unicast RPF Spoofing Vulnerability
Trust: 0.3
sources:
BID: 42741
DESCRIPTION
SEIL routers are prone to a spoofing vulnerability. An attacker can exploit this issue to bypass the filtering of Unicast messages, which may aid in further attacks.
Trust: 0.3
sources:
BID: 42741
AFFECTED PRODUCTS
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.52 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.51 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.50 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.49 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.48 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.47 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.46 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.45 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.44 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.43 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.42 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.41 | Trust: 0.3 |
vendor: | seil | model: | seil/x2 | scope: | eq | version: | 2.40 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.52 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.51 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.50 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.49 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.48 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.47 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.46 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.45 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.44 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.43 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.42 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.41 | Trust: 0.3 |
vendor: | seil | model: | seil/x1 | scope: | eq | version: | 2.40 | Trust: 0.3 |
vendor: | seil | model: | seil/b1 | scope: | eq | version: | 2.60 | Trust: 0.3 |
vendor: | seil | model: | seil/b1 | scope: | eq | version: | 2.52 | Trust: 0.3 |
vendor: | seil | model: | seil/b1 | scope: | eq | version: | 2.51 | Trust: 0.3 |
vendor: | seil | model: | seil/b1 | scope: | eq | version: | 2.50 | Trust: 0.3 |
vendor: | seil | model: | seil/b1 | scope: | eq | version: | 2.48 | Trust: 0.3 |
sources:
BID: 42741
THREAT TYPE
network
Trust: 0.3
sources:
BID: 42741
TYPE
Origin Validation Error
Trust: 0.3
sources:
BID: 42741
EXTERNAL IDS
db: | BID | id: | 42741 | Trust: 0.3 |
sources:
BID: 42741
REFERENCES
url: | http://www.seil.jp/ | Trust: 0.3 |
url: | http://www.seil.jp/seilseries/security/2010/a00875.php | Trust: 0.3 |
sources:
BID: 42741
CREDITS
Reported by the vendor
Trust: 0.3
sources:
BID: 42741
SOURCES
db: | BID | id: | 42741 |
LAST UPDATE DATE
2022-05-17T02:01:24.820000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 42741 | date: | 2010-08-25T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 42741 | date: | 2010-08-25T00:00:00 |