fkie_cve-2014-7256
Vulnerability from fkie_nvd
Published
2014-12-05 17:59
Modified
2025-04-12 10:46
Severity ?
Summary
The (1) PPP Access Concentrator (PPPAC) and (2) Dial-Up Networking Internet Initiative Japan Inc. SEIL series routers SEIL/x86 Fuji 1.00 through 3.22; SEIL/X1, SEIL/X2, and SEIL/B1 1.00 through 4.62; SEIL/Turbo 1.82 through 2.18; and SEIL/neu 2FE Plus 1.82 through 2.18 allow remote attackers to cause a denial of service (restart) via crafted (a) GRE or (b) MPPE packets.
Impacted products
Vendor Product Version
iij seil_plus_firmware 1.82
iij seil_plus_firmware 1.83
iij seil_plus_firmware 1.84
iij seil_plus_firmware 1.85
iij seil_plus_firmware 1.86
iij seil_plus_firmware 1.87
iij seil_plus_firmware 1.88
iij seil_plus_firmware 1.89
iij seil_plus_firmware 1.90
iij seil_plus_firmware 1.91
iij seil_plus_firmware 1.92
iij seil_plus_firmware 1.93
iij seil_plus_firmware 1.94
iij seil_plus_firmware 1.95
iij seil_plus_firmware 1.96
iij seil_plus_firmware 1.97
iij seil_plus_firmware 1.98
iij seil_plus_firmware 1.99
iij seil_plus_firmware 2.01
iij seil_plus_firmware 2.02
iij seil_plus_firmware 2.03
iij seil_plus_firmware 2.04
iij seil_plus_firmware 2.05
iij seil_plus_firmware 2.06
iij seil_plus_firmware 2.07
iij seil_plus_firmware 2.08
iij seil_plus_firmware 2.09
iij seil_plus_firmware 2.10
iij seil_plus_firmware 2.11
iij seil_plus_firmware 2.12
iij seil_plus_firmware 2.13
iij seil_plus_firmware 2.14
iij seil_plus_firmware 2.15
iij seil_plus_firmware 2.16
iij seil_plus_firmware 2.17
iij seil_plus_firmware 2.18
iij seil_plus -
iij seil_b1_firmware *
iij seil_b1 -
iij seil_x1_firmware *
iij seil_x1 -
iij seil_turbo_firmware 1.82
iij seil_turbo_firmware 1.83
iij seil_turbo_firmware 1.84
iij seil_turbo_firmware 1.85
iij seil_turbo_firmware 1.86
iij seil_turbo_firmware 1.87
iij seil_turbo_firmware 1.88
iij seil_turbo_firmware 1.89
iij seil_turbo_firmware 1.90
iij seil_turbo_firmware 1.91
iij seil_turbo_firmware 1.92
iij seil_turbo_firmware 1.93
iij seil_turbo_firmware 1.94
iij seil_turbo_firmware 1.95
iij seil_turbo_firmware 1.96
iij seil_turbo_firmware 1.97
iij seil_turbo_firmware 1.98
iij seil_turbo_firmware 1.99
iij seil_turbo_firmware 2.00
iij seil_turbo_firmware 2.01
iij seil_turbo_firmware 2.02
iij seil_turbo_firmware 2.03
iij seil_turbo_firmware 2.04
iij seil_turbo_firmware 2.05
iij seil_turbo_firmware 2.06
iij seil_turbo_firmware 2.07
iij seil_turbo_firmware 2.08
iij seil_turbo_firmware 2.09
iij seil_turbo_firmware 2.10
iij seil_turbo_firmware 2.11
iij seil_turbo_firmware 2.12
iij seil_turbo_firmware 2.13
iij seil_turbo_firmware 2.14
iij seil_turbo_firmware 2.15
iij seil_turbo_firmware 2.16
iij seil_turbo_firmware 2.17
iij seil_turbo_firmware 2.18
iij seil_turbo -
iij seil_x86_fuji_firmware *
iij seil_x86_fuji -
iij seil_x2_firmware *
iij seil_x2 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8AF81A7-837E-4761-ADAF-1756F56E6263",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "04A44243-F621-4DDB-9621-D564B32D436E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C9F3288-BB87-4673-BD2E-25B48A04CE8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "935EAFE9-A8FF-41E8-AE64-0E7FC4F271B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "10CC1B2F-A6C1-4B8D-9E27-2D5A98682DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5898040-ADC5-458B-B193-4A52C77CBC7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E19D2EE-84F2-4FAC-A6A6-24D63D819F5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5BD396-126A-40EE-AC81-A0F687C3762A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "42BC9943-7C7B-456C-BBF4-0A87E030836C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ABFBB33-987E-4FE5-A106-0C32247974EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A724AF0-86A8-428A-BD5E-C0BD1CA08072",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A12AC3D-D2CE-41BF-8F27-B6936484BD8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BEA1CB3-543A-42B7-9CA6-D470B0342137",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.95:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2B05CB0-38B6-4F40-A90A-C81FE7ADA9E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.96:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB67B970-6546-45DD-B8FC-1F1F27BB050F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.97:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB8DB634-413D-41DD-B596-5730542B49B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.98:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E44179-D3E6-4106-96E3-122B3A4806C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:1.99:*:*:*:*:*:*:*",
              "matchCriteriaId": "5483C73C-3345-4492-9AB5-BC6489BAF9B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "F17EC984-B88B-4D3E-B956-78CB3041BB40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBA99711-7FF7-4EA9-8E8B-20477FE8CBE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "839CD215-C503-436A-A824-DAB168A0E2EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6FFA2B0-529C-4D02-96E6-6A70A0A68C32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D8F5B49-A097-4912-8C44-1538A487A73F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DD7EA50-ED35-41C5-8BA2-73F479FF45B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C62D9B6-F9C8-467D-9B40-3BF702080253",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF27EB9-E61D-4720-BC3B-8273DB5750D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "53D3AF7E-852A-4D63-8804-55B800156463",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AEC9267-68F1-4F06-AC94-B258A7EADF57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA5828AF-1771-446F-B1C9-C9E784374E42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1DF1912-2D0A-4AF8-9FB8-F4D68E61B1D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "285986CA-EF04-4BAB-85F7-26E6B9E3F5C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "99D619EB-2CAF-4D82-A85C-E6DC34C2503B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E368622-0061-4774-B840-8EF019118259",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "90A042D8-749D-4D60-A6E9-6055CFD96301",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C27E5D8-F686-4FBF-89C6-63F8C9ABDCDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_plus_firmware:2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBEF318E-0942-473E-9B59-E3E2EA38A881",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil_plus:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DF4D75F-1C14-43F6-9EAA-378259A4F619",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil_b1_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06F00C33-488B-4B95-AE61-8DFBB7BC87EE",
              "versionEndIncluding": "4.61",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil_b1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "940A003E-562A-4CA9-9BED-0BE0D5D920AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil_x1_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E1C7880-0B1A-473C-9A6C-038BD56AA188",
              "versionEndIncluding": "4.61",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil_x1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3D0488C-1B4D-439F-BF9F-32582FE940CE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.82:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A4ED3E9-E9E9-4D8E-959B-8C12C887340B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.83:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EEE850C-CF9D-4508-9900-48F2F57D0A17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.84:*:*:*:*:*:*:*",
              "matchCriteriaId": "36FDE24C-07C4-459F-A581-4EC759398227",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.85:*:*:*:*:*:*:*",
              "matchCriteriaId": "297D6A60-813A-4CC3-BBE3-3C6F8FA404E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.86:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D5C43E9-817C-4AB9-8799-DD155A038CC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.87:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEB8FF74-0E02-4E23-A19E-4BB976947704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.88:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB4919C-FC12-4988-A4CE-C6726C7207EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.89:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3CF9E9B-5520-438C-92C8-A7D695324963",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "A84D2EA5-61D9-4A30-929B-7EBE636ED7E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.91:*:*:*:*:*:*:*",
              "matchCriteriaId": "12756F24-A3FD-44FB-B84C-B42B496A6A6F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.92:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE4B9526-F557-423C-B999-562C01EAB95A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.93:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA4687A4-1B12-4E41-BEB1-8A80A97DB593",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.94:*:*:*:*:*:*:*",
              "matchCriteriaId": "791B43C4-EC52-496C-BA7B-2D8228ED59B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.95:*:*:*:*:*:*:*",
              "matchCriteriaId": "13249B53-826E-4790-87B0-076416B71790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.96:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C79D356-1006-4FFC-AFFD-207043BA56BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.97:*:*:*:*:*:*:*",
              "matchCriteriaId": "C15676AA-BCD2-457C-AEA5-876397B45645",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.98:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F844D0E-8658-4B61-B40F-0E9CCD143CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:1.99:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAB20ADD-7475-4D81-A267-0FD91B19DF68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "D212AD73-011B-426B-A625-0842C11E737D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "21362248-D616-4E45-B7AA-2865CCEB507D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "03625630-67AB-40F4-BDF2-CCEC929DD365",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5BF6BB7-4B1B-4627-B8B4-E089FD16BCEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC8A93F7-53F1-4F45-83D7-34E7C8018D6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E746B5-456F-41DC-924A-08A33A7F589E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "29099FC4-3300-464C-A833-32E59443FFBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.07:*:*:*:*:*:*:*",
              "matchCriteriaId": "63C8E019-2F2C-46F6-9D87-A79EC0D04237",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "599BDA78-531C-42FB-B9BC-A515E40AB911",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAA31574-967E-4B0F-9924-FB0F785FD4BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB4B8805-B369-475E-A04E-2413D3BDD854",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D5A1FE6-AE75-42C6-83A0-1855312B460F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEB947C1-D8E6-4AF4-A1C0-323E7FC13449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2F37FE5-E1E6-4F4A-8917-7CAB1FD2ADFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB38BC1D-298B-4DF0-AF8E-154A77E9624A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "5537DCAE-BFCD-4230-935B-0BFBDF6310B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "32053A0F-7732-41E8-AACB-3793A0B5736C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "062FDD27-9BC3-4086-B477-5890386B4403",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:iij:seil_turbo_firmware:2.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "78B5FC86-C877-42FB-8FDA-EC25EA3B064B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil_turbo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EAFE445-793F-4226-90B4-E949E871E5DE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil_x86_fuji_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "02958119-053F-4D3E-AB1A-D6180F86FA98",
              "versionEndIncluding": "3.21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil_x86_fuji:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB961AA2-6D5C-4979-AE8A-80D6D2D48071",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:iij:seil_x2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4138D3AD-2B60-4C1A-92ED-2A42DC1B4ADE",
              "versionEndIncluding": "4.61",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:iij:seil_x2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16B0262C-DF1A-4A8B-B4D2-CCB9D71EFBFE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The (1) PPP Access Concentrator (PPPAC) and (2) Dial-Up Networking Internet Initiative Japan Inc. SEIL series routers SEIL/x86 Fuji 1.00 through 3.22; SEIL/X1, SEIL/X2, and SEIL/B1 1.00 through 4.62; SEIL/Turbo 1.82 through 2.18; and SEIL/neu 2FE Plus 1.82 through 2.18 allow remote attackers to cause a denial of service (restart) via crafted (a) GRE or (b) MPPE packets."
    },
    {
      "lang": "es",
      "value": "Los routers de la serie SEIL/x86 Fuji (1) PPP Access Concentrator (PPPAC) y (2) Dial-Up Networking Internet Initiative Japan Inc. SEIL 1.00 hasta 3.22; SEIL/X1, SEIL/X2, y SEIL/B1 1.00 hasta 4.62; SEIL/Turbo 1.82 hasta 2.18; y SEIL/neu 2FE Plus 1.82 hasta 2.18 permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio) a trav\u00e9s de paquetes (a) GRE o (b) MPPE manipulados."
    }
  ],
  "id": "CVE-2014-7256",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-12-05T17:59:05.197",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN04895240/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000136.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.seil.jp/support/security/a01511.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN04895240/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-000136.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.seil.jp/support/security/a01511.html"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…