ID

VAR-201412-0599


CVE

CVE-2014-7256


TITLE

SEIL Series routers vulnerable to denial-of-service (DoS)

Trust: 0.8

sources: JVNDB: JVNDB-2014-000136

DESCRIPTION

The (1) PPP Access Concentrator (PPPAC) and (2) Dial-Up Networking Internet Initiative Japan Inc. SEIL series routers SEIL/x86 Fuji 1.00 through 3.22; SEIL/X1, SEIL/X2, and SEIL/B1 1.00 through 4.62; SEIL/Turbo 1.82 through 2.18; and SEIL/neu 2FE Plus 1.82 through 2.18 allow remote attackers to cause a denial of service (restart) via crafted (a) GRE or (b) MPPE packets. contain a denial-of-service (DoS) vulnerability due to an issue in processing certain packets (CWE-119). Note that this vulnerability is different from JVN#21907573.By receiving a specially crafted packet, the device may be rebooted. SEIL is a series of router devices. SEIL Series Routers are prone to multiple remote denial-of-service vulnerabilities. SEIL routers. SEIL/x86 Fuji Version 1.00 to Version 3.22; SEIL/X1, SEIL/X2, SEIL/B1 Version 1.00 to Version 4.62; SEIL/Turbo Version 1.82 to Version 2.18; SEIL/X1 neu 2FE Plus version 1.82 to version 2.18

Trust: 2.61

sources: NVD: CVE-2014-7256 // JVNDB: JVNDB-2014-000136 // CNVD: CNVD-2014-08651 // BID: 71385 // VULHUB: VHN-75201 // VULMON: CVE-2014-7256

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-08651

AFFECTED PRODUCTS

vendor:iijmodel:seil turboscope:eqversion:2.16

Trust: 1.6

vendor:iijmodel:seil turboscope:eqversion:2.14

Trust: 1.6

vendor:iijmodel:seil turboscope:eqversion:2.15

Trust: 1.6

vendor:iijmodel:seil turboscope:eqversion:2.12

Trust: 1.6

vendor:iijmodel:seil turboscope:eqversion:2.18

Trust: 1.6

vendor:iijmodel:seil turboscope:eqversion:2.17

Trust: 1.6

vendor:iijmodel:seil turboscope:eqversion:2.11

Trust: 1.6

vendor:iijmodel:seil turboscope:eqversion:2.13

Trust: 1.6

vendor:iijmodel:seil plusscope:eqversion:1.94

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:1.93

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:1.92

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:1.87

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:1.82

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:2.01

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:1.86

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:2.08

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:2.13

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:1.89

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:1.85

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:1.84

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:1.85

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:1.90

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion: -

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:2.17

Trust: 1.0

vendor:iijmodel:seil x86 fujiscope:lteversion:3.21

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:1.99

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:1.97

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:2.02

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:2.16

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:2.03

Trust: 1.0

vendor:iijmodel:seil b1scope:lteversion:4.61

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:2.06

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:1.98

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:2.05

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:2.03

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:2.15

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:2.12

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:2.07

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:1.96

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:2.00

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:2.04

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:1.82

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion: -

Trust: 1.0

vendor:iijmodel:seil x2scope:lteversion:4.61

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:1.95

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:1.94

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:1.92

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:1.87

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:2.01

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:1.86

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:2.08

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:1.84

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:1.90

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:2.09

Trust: 1.0

vendor:iijmodel:seil x1scope:lteversion:4.61

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:1.89

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:2.11

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:1.99

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:2.09

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:2.06

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:1.98

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:1.88

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:2.05

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:1.97

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:2.02

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:1.83

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:2.18

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:1.88

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:1.91

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:2.10

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:1.83

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:2.04

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:1.91

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:2.10

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:1.93

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:2.07

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:2.14

Trust: 1.0

vendor:iijmodel:seil turboscope:eqversion:1.96

Trust: 1.0

vendor:iijmodel:seil plusscope:eqversion:1.95

Trust: 1.0

vendor:internet initiativemodel:seil/b1scope:eqversion:1.00 to 4.62

Trust: 0.8

vendor:internet initiativemodel:seil/neu 2fe plusscope:eqversion:1.82 to 2.18

Trust: 0.8

vendor:internet initiativemodel:seil/turboscope:eqversion:1.82 to 2.18

Trust: 0.8

vendor:internet initiativemodel:seil/x1scope:eqversion:1.00 to 4.62

Trust: 0.8

vendor:internet initiativemodel:seil/x2scope:eqversion:1.00 to 4.62

Trust: 0.8

vendor:internet initiativemodel:seil/x86 fujiscope:eqversion:1.00 to 3.22

Trust: 0.8

vendor:internet initiativemodel:seil series routersscope: - version: -

Trust: 0.6

vendor:iijmodel:seil x86 fujiscope:eqversion:3.21

Trust: 0.6

vendor:iijmodel:seil x2scope:eqversion:4.61

Trust: 0.6

vendor:seilmodel:seil/x2scope:eqversion:3.75

Trust: 0.3

vendor:seilmodel:seil/x2scope:eqversion:3.12

Trust: 0.3

vendor:seilmodel:seil/x2scope:eqversion:3.11

Trust: 0.3

vendor:seilmodel:seil/x2scope:eqversion:2.52

Trust: 0.3

vendor:seilmodel:seil/x2scope:eqversion:2.51

Trust: 0.3

vendor:seilmodel:seil/x2scope:eqversion:2.50

Trust: 0.3

vendor:seilmodel:seil/x2scope:eqversion:2.49

Trust: 0.3

vendor:seilmodel:seil/x2scope:eqversion:2.48

Trust: 0.3

vendor:seilmodel:seil/x2scope:eqversion:2.47

Trust: 0.3

vendor:seilmodel:seil/x2scope:eqversion:2.46

Trust: 0.3

vendor:seilmodel:seil/x2scope:eqversion:2.45

Trust: 0.3

vendor:seilmodel:seil/x2scope:eqversion:2.44

Trust: 0.3

vendor:seilmodel:seil/x2scope:eqversion:2.43

Trust: 0.3

vendor:seilmodel:seil/x2scope:eqversion:2.42

Trust: 0.3

vendor:seilmodel:seil/x2scope:eqversion:2.41

Trust: 0.3

vendor:seilmodel:seil/x2scope:eqversion:2.40

Trust: 0.3

vendor:seilmodel:seil/x2scope:eqversion:2.30

Trust: 0.3

vendor:seilmodel:seil/x2scope:eqversion:1.00

Trust: 0.3

vendor:seilmodel:seil/x1scope:eqversion:3.75

Trust: 0.3

vendor:seilmodel:seil/x1scope:eqversion:3.12

Trust: 0.3

vendor:seilmodel:seil/x1scope:eqversion:3.11

Trust: 0.3

vendor:seilmodel:seil/x1scope:eqversion:2.52

Trust: 0.3

vendor:seilmodel:seil/x1scope:eqversion:2.51

Trust: 0.3

vendor:seilmodel:seil/x1scope:eqversion:2.50

Trust: 0.3

vendor:seilmodel:seil/x1scope:eqversion:2.49

Trust: 0.3

vendor:seilmodel:seil/x1scope:eqversion:2.48

Trust: 0.3

vendor:seilmodel:seil/x1scope:eqversion:2.47

Trust: 0.3

vendor:seilmodel:seil/x1scope:eqversion:2.46

Trust: 0.3

vendor:seilmodel:seil/x1scope:eqversion:2.45

Trust: 0.3

vendor:seilmodel:seil/x1scope:eqversion:2.44

Trust: 0.3

vendor:seilmodel:seil/x1scope:eqversion:2.43

Trust: 0.3

vendor:seilmodel:seil/x1scope:eqversion:2.42

Trust: 0.3

vendor:seilmodel:seil/x1scope:eqversion:2.41

Trust: 0.3

vendor:seilmodel:seil/x1scope:eqversion:2.40

Trust: 0.3

vendor:seilmodel:seil/x1scope:eqversion:2.30

Trust: 0.3

vendor:seilmodel:seil/x1scope:eqversion:1.00

Trust: 0.3

vendor:seilmodel:seil/b1scope:eqversion:3.75

Trust: 0.3

vendor:seilmodel:seil/b1scope:eqversion:3.12

Trust: 0.3

vendor:seilmodel:seil/b1scope:eqversion:3.11

Trust: 0.3

vendor:seilmodel:seil/b1scope:eqversion:2.60

Trust: 0.3

vendor:seilmodel:seil/b1scope:eqversion:2.52

Trust: 0.3

vendor:seilmodel:seil/b1scope:eqversion:2.51

Trust: 0.3

vendor:seilmodel:seil/b1scope:eqversion:2.50

Trust: 0.3

vendor:seilmodel:seil/b1scope:eqversion:2.48

Trust: 0.3

vendor:seilmodel:seil/b1scope:eqversion:2.30

Trust: 0.3

vendor:seilmodel:seil/b1scope:eqversion:1.00

Trust: 0.3

sources: CNVD: CNVD-2014-08651 // BID: 71385 // JVNDB: JVNDB-2014-000136 // CNNVD: CNNVD-201412-121 // NVD: CVE-2014-7256

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-7256
value: HIGH

Trust: 1.0

IPA: JVNDB-2014-000136
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2014-08651
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201412-121
value: HIGH

Trust: 0.6

VULHUB: VHN-75201
value: HIGH

Trust: 0.1

VULMON: CVE-2014-7256
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2014-7256
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

IPA: JVNDB-2014-000136
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2014-08651
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-75201
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-08651 // VULHUB: VHN-75201 // VULMON: CVE-2014-7256 // JVNDB: JVNDB-2014-000136 // CNNVD: CNNVD-201412-121 // NVD: CVE-2014-7256

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.1

problemtype:CWE-119

Trust: 0.8

sources: VULHUB: VHN-75201 // JVNDB: JVNDB-2014-000136 // NVD: CVE-2014-7256

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201412-121

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201412-121

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-000136

PATCH

title:Internet Initiative Japan Inc. websiteurl:http://www.seil.jp/support/security/a01511.html

Trust: 0.8

title:SEIL Series Routers has multiple patches for denial of service vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/52346

Trust: 0.6

sources: CNVD: CNVD-2014-08651 // JVNDB: JVNDB-2014-000136

EXTERNAL IDS

db:NVDid:CVE-2014-7256

Trust: 3.5

db:JVNid:JVN04895240

Trust: 2.9

db:JVNDBid:JVNDB-2014-000136

Trust: 2.6

db:BIDid:71385

Trust: 1.7

db:CNNVDid:CNNVD-201412-121

Trust: 0.7

db:CNVDid:CNVD-2014-08651

Trust: 0.6

db:SECUNIAid:60297

Trust: 0.6

db:VULHUBid:VHN-75201

Trust: 0.1

db:VULMONid:CVE-2014-7256

Trust: 0.1

sources: CNVD: CNVD-2014-08651 // VULHUB: VHN-75201 // VULMON: CVE-2014-7256 // BID: 71385 // JVNDB: JVNDB-2014-000136 // CNNVD: CNNVD-201412-121 // NVD: CVE-2014-7256

REFERENCES

url:http://jvn.jp/en/jp/jvn04895240/index.html

Trust: 2.9

url:http://www.seil.jp/support/security/a01511.html

Trust: 1.8

url:http://jvndb.jvn.jp/ja/contents/2014/jvndb-2014-000136.html

Trust: 1.8

url:http://www.securityfocus.com/bid/71385

Trust: 1.3

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-7256

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-7256

Trust: 0.8

url:http://secunia.com/advisories/60297

Trust: 0.6

url:http://www.seil.jp/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/399.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2014-08651 // VULHUB: VHN-75201 // VULMON: CVE-2014-7256 // BID: 71385 // JVNDB: JVNDB-2014-000136 // CNNVD: CNNVD-201412-121 // NVD: CVE-2014-7256

CREDITS

The vendor reported these issues.

Trust: 0.3

sources: BID: 71385

SOURCES

db:CNVDid:CNVD-2014-08651
db:VULHUBid:VHN-75201
db:VULMONid:CVE-2014-7256
db:BIDid:71385
db:JVNDBid:JVNDB-2014-000136
db:CNNVDid:CNNVD-201412-121
db:NVDid:CVE-2014-7256

LAST UPDATE DATE

2025-04-13T23:18:13.116000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-08651date:2014-12-03T00:00:00
db:VULHUBid:VHN-75201date:2015-10-28T00:00:00
db:VULMONid:CVE-2014-7256date:2015-10-28T00:00:00
db:BIDid:71385date:2014-12-01T00:00:00
db:JVNDBid:JVNDB-2014-000136date:2014-12-09T00:00:00
db:CNNVDid:CNNVD-201412-121date:2014-12-08T00:00:00
db:NVDid:CVE-2014-7256date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-08651date:2014-12-03T00:00:00
db:VULHUBid:VHN-75201date:2014-12-05T00:00:00
db:VULMONid:CVE-2014-7256date:2014-12-05T00:00:00
db:BIDid:71385date:2014-12-01T00:00:00
db:JVNDBid:JVNDB-2014-000136date:2014-12-01T00:00:00
db:CNNVDid:CNNVD-201412-121date:2014-12-05T00:00:00
db:NVDid:CVE-2014-7256date:2014-12-05T17:59:05.197