CVE-2014-7256 (GCVE-0-2014-7256)
Vulnerability from cvelistv5
Published
2014-12-05 17:00
Modified
2024-08-06 12:40
Severity ?
CWE
  • n/a
Summary
The (1) PPP Access Concentrator (PPPAC) and (2) Dial-Up Networking Internet Initiative Japan Inc. SEIL series routers SEIL/x86 Fuji 1.00 through 3.22; SEIL/X1, SEIL/X2, and SEIL/B1 1.00 through 4.62; SEIL/Turbo 1.82 through 2.18; and SEIL/neu 2FE Plus 1.82 through 2.18 allow remote attackers to cause a denial of service (restart) via crafted (a) GRE or (b) MPPE packets.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T12:40:19.266Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.seil.jp/support/security/a01511.html"
          },
          {
            "name": "JVNDB-2014-000136",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000136.html"
          },
          {
            "name": "JVN#04895240",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN04895240/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-12-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The (1) PPP Access Concentrator (PPPAC) and (2) Dial-Up Networking Internet Initiative Japan Inc. SEIL series routers SEIL/x86 Fuji 1.00 through 3.22; SEIL/X1, SEIL/X2, and SEIL/B1 1.00 through 4.62; SEIL/Turbo 1.82 through 2.18; and SEIL/neu 2FE Plus 1.82 through 2.18 allow remote attackers to cause a denial of service (restart) via crafted (a) GRE or (b) MPPE packets."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-12-05T16:57:00",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.seil.jp/support/security/a01511.html"
        },
        {
          "name": "JVNDB-2014-000136",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000136.html"
        },
        {
          "name": "JVN#04895240",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN04895240/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-7256",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The (1) PPP Access Concentrator (PPPAC) and (2) Dial-Up Networking Internet Initiative Japan Inc. SEIL series routers SEIL/x86 Fuji 1.00 through 3.22; SEIL/X1, SEIL/X2, and SEIL/B1 1.00 through 4.62; SEIL/Turbo 1.82 through 2.18; and SEIL/neu 2FE Plus 1.82 through 2.18 allow remote attackers to cause a denial of service (restart) via crafted (a) GRE or (b) MPPE packets."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.seil.jp/support/security/a01511.html",
              "refsource": "CONFIRM",
              "url": "http://www.seil.jp/support/security/a01511.html"
            },
            {
              "name": "JVNDB-2014-000136",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000136.html"
            },
            {
              "name": "JVN#04895240",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN04895240/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-7256",
    "datePublished": "2014-12-05T17:00:00",
    "dateReserved": "2014-09-30T00:00:00",
    "dateUpdated": "2024-08-06T12:40:19.266Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2014-7256\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2014-12-05T17:59:05.197\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The (1) PPP Access Concentrator (PPPAC) and (2) Dial-Up Networking Internet Initiative Japan Inc. SEIL series routers SEIL/x86 Fuji 1.00 through 3.22; SEIL/X1, SEIL/X2, and SEIL/B1 1.00 through 4.62; SEIL/Turbo 1.82 through 2.18; and SEIL/neu 2FE Plus 1.82 through 2.18 allow remote attackers to cause a denial of service (restart) via crafted (a) GRE or (b) MPPE packets.\"},{\"lang\":\"es\",\"value\":\"Los routers de la serie SEIL/x86 Fuji (1) PPP Access Concentrator (PPPAC) y (2) Dial-Up Networking Internet Initiative Japan Inc. SEIL 1.00 hasta 3.22; SEIL/X1, SEIL/X2, y SEIL/B1 1.00 hasta 4.62; SEIL/Turbo 1.82 hasta 2.18; y SEIL/neu 2FE Plus 1.82 hasta 2.18 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio) a trav\u00e9s de paquetes (a) GRE o (b) MPPE manipulados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:1.82:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8AF81A7-837E-4761-ADAF-1756F56E6263\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:1.83:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04A44243-F621-4DDB-9621-D564B32D436E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:1.84:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C9F3288-BB87-4673-BD2E-25B48A04CE8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:1.85:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"935EAFE9-A8FF-41E8-AE64-0E7FC4F271B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:1.86:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10CC1B2F-A6C1-4B8D-9E27-2D5A98682DFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:1.87:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5898040-ADC5-458B-B193-4A52C77CBC7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:1.88:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E19D2EE-84F2-4FAC-A6A6-24D63D819F5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:1.89:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E5BD396-126A-40EE-AC81-A0F687C3762A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:1.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42BC9943-7C7B-456C-BBF4-0A87E030836C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:1.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ABFBB33-987E-4FE5-A106-0C32247974EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:1.92:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A724AF0-86A8-428A-BD5E-C0BD1CA08072\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:1.93:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A12AC3D-D2CE-41BF-8F27-B6936484BD8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:1.94:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BEA1CB3-543A-42B7-9CA6-D470B0342137\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:1.95:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2B05CB0-38B6-4F40-A90A-C81FE7ADA9E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:1.96:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB67B970-6546-45DD-B8FC-1F1F27BB050F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:1.97:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB8DB634-413D-41DD-B596-5730542B49B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:1.98:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33E44179-D3E6-4106-96E3-122B3A4806C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:1.99:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5483C73C-3345-4492-9AB5-BC6489BAF9B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:2.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F17EC984-B88B-4D3E-B956-78CB3041BB40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:2.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBA99711-7FF7-4EA9-8E8B-20477FE8CBE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:2.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"839CD215-C503-436A-A824-DAB168A0E2EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:2.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6FFA2B0-529C-4D02-96E6-6A70A0A68C32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:2.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D8F5B49-A097-4912-8C44-1538A487A73F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:2.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DD7EA50-ED35-41C5-8BA2-73F479FF45B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:2.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C62D9B6-F9C8-467D-9B40-3BF702080253\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:2.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AF27EB9-E61D-4720-BC3B-8273DB5750D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:2.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D3AF7E-852A-4D63-8804-55B800156463\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AEC9267-68F1-4F06-AC94-B258A7EADF57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA5828AF-1771-446F-B1C9-C9E784374E42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1DF1912-2D0A-4AF8-9FB8-F4D68E61B1D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"285986CA-EF04-4BAB-85F7-26E6B9E3F5C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99D619EB-2CAF-4D82-A85C-E6DC34C2503B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E368622-0061-4774-B840-8EF019118259\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90A042D8-749D-4D60-A6E9-6055CFD96301\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C27E5D8-F686-4FBF-89C6-63F8C9ABDCDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_plus_firmware:2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBEF318E-0942-473E-9B59-E3E2EA38A881\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:iij:seil_plus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DF4D75F-1C14-43F6-9EAA-378259A4F619\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_b1_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.61\",\"matchCriteriaId\":\"06F00C33-488B-4B95-AE61-8DFBB7BC87EE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:iij:seil_b1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"940A003E-562A-4CA9-9BED-0BE0D5D920AD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_x1_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.61\",\"matchCriteriaId\":\"1E1C7880-0B1A-473C-9A6C-038BD56AA188\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:iij:seil_x1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3D0488C-1B4D-439F-BF9F-32582FE940CE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:1.82:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A4ED3E9-E9E9-4D8E-959B-8C12C887340B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:1.83:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EEE850C-CF9D-4508-9900-48F2F57D0A17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:1.84:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36FDE24C-07C4-459F-A581-4EC759398227\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:1.85:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"297D6A60-813A-4CC3-BBE3-3C6F8FA404E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:1.86:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D5C43E9-817C-4AB9-8799-DD155A038CC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:1.87:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEB8FF74-0E02-4E23-A19E-4BB976947704\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:1.88:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CB4919C-FC12-4988-A4CE-C6726C7207EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:1.89:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3CF9E9B-5520-438C-92C8-A7D695324963\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:1.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A84D2EA5-61D9-4A30-929B-7EBE636ED7E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:1.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12756F24-A3FD-44FB-B84C-B42B496A6A6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:1.92:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE4B9526-F557-423C-B999-562C01EAB95A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:1.93:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA4687A4-1B12-4E41-BEB1-8A80A97DB593\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:1.94:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"791B43C4-EC52-496C-BA7B-2D8228ED59B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:1.95:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13249B53-826E-4790-87B0-076416B71790\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:1.96:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C79D356-1006-4FFC-AFFD-207043BA56BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:1.97:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C15676AA-BCD2-457C-AEA5-876397B45645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:1.98:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F844D0E-8658-4B61-B40F-0E9CCD143CB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:1.99:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAB20ADD-7475-4D81-A267-0FD91B19DF68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:2.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D212AD73-011B-426B-A625-0842C11E737D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:2.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21362248-D616-4E45-B7AA-2865CCEB507D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:2.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03625630-67AB-40F4-BDF2-CCEC929DD365\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:2.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5BF6BB7-4B1B-4627-B8B4-E089FD16BCEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:2.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC8A93F7-53F1-4F45-83D7-34E7C8018D6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:2.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6E746B5-456F-41DC-924A-08A33A7F589E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:2.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29099FC4-3300-464C-A833-32E59443FFBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:2.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63C8E019-2F2C-46F6-9D87-A79EC0D04237\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:2.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"599BDA78-531C-42FB-B9BC-A515E40AB911\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:2.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAA31574-967E-4B0F-9924-FB0F785FD4BE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB4B8805-B369-475E-A04E-2413D3BDD854\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D5A1FE6-AE75-42C6-83A0-1855312B460F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB947C1-D8E6-4AF4-A1C0-323E7FC13449\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2F37FE5-E1E6-4F4A-8917-7CAB1FD2ADFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB38BC1D-298B-4DF0-AF8E-154A77E9624A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5537DCAE-BFCD-4230-935B-0BFBDF6310B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32053A0F-7732-41E8-AACB-3793A0B5736C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"062FDD27-9BC3-4086-B477-5890386B4403\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_turbo_firmware:2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78B5FC86-C877-42FB-8FDA-EC25EA3B064B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:h:iij:seil_turbo:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EAFE445-793F-4226-90B4-E949E871E5DE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_x86_fuji_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.21\",\"matchCriteriaId\":\"02958119-053F-4D3E-AB1A-D6180F86FA98\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:iij:seil_x86_fuji:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB961AA2-6D5C-4979-AE8A-80D6D2D48071\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:iij:seil_x2_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.61\",\"matchCriteriaId\":\"4138D3AD-2B60-4C1A-92ED-2A42DC1B4ADE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:iij:seil_x2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16B0262C-DF1A-4A8B-B4D2-CCB9D71EFBFE\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/en/jp/JVN04895240/index.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000136.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://www.seil.jp/support/security/a01511.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://jvn.jp/en/jp/JVN04895240/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000136.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.seil.jp/support/security/a01511.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…