jvndb-2013-000091
Vulnerability from jvndb
Published
2013-09-20 14:52
Modified
2013-10-08 15:36
Summary
SEIL Series routers vulnerable in RADIUS authentication
Details
SEIL Series routers contain a vulnerability in RADIUS authentication.
The PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contains an issue when generating random numbers used for RADIUS authentication, which may result in the generated random numbers to be easily predicted.
References
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000091.html",
"dc:date": "2013-10-08T15:36+09:00",
"dcterms:issued": "2013-09-20T14:52+09:00",
"dcterms:modified": "2013-10-08T15:36+09:00",
"description": "SEIL Series routers contain a vulnerability in RADIUS authentication.\r\n\r\nThe PPP Access Concentrator (PPPAC) in SEIL Series routers provided by Internet Initiative Japan Inc. contains an issue when generating random numbers used for RADIUS authentication, which may result in the generated random numbers to be easily predicted.",
"link": "https://jvndb.jvn.jp/en/contents/2013/JVNDB-2013-000091.html",
"sec:cpe": [
{
"#text": "cpe:/h:iij:seil%2Fb1",
"@product": "SEIL/B1",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:iij:seil%2Fneu_2fe_plus",
"@product": "SEIL/neu 2FE Plus",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:iij:seil%2Fturbo",
"@product": "SEIL/Turbo",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:iij:seil%2Fx1",
"@product": "SEIL/X1",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:iij:seil%2Fx2",
"@product": "SEIL/X2",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/h:iij:seil%2Fx86",
"@product": "SEIL/x86",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:iij:seil%252fb1_firmware",
"@product": "SEIL/B1 firmware",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:iij:seil%252fneu_2fe_plus_firmware",
"@product": "SEIL/neu 2FE Plus firmware",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:iij:seil%252fturbo_firmware",
"@product": "SEIL/Turbo firmware",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:iij:seil%252fx1_firmware",
"@product": "SEIL/X1 firmware",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:iij:seil%252fx2_firmware",
"@product": "SEIL/X2 firmware",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
},
{
"#text": "cpe:/o:iij:seil%252fx86_firmware",
"@product": "SEIL/x86 firmware",
"@vendor": "Internet Initiative Japan Inc.",
"@version": "2.2"
}
],
"sec:cvss": {
"@score": "4.0",
"@severity": "Medium",
"@type": "Base",
"@vector": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2013-000091",
"sec:references": [
{
"#text": "https://jvn.jp/en/jp/JVN40079308/",
"@id": "JVN#40079308",
"@source": "JVN"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4708",
"@id": "CVE-2013-4708",
"@source": "CVE"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4708",
"@id": "CVE-2013-4708",
"@source": "NVD"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-Other",
"@title": "No Mapping(CWE-Other)"
}
],
"title": "SEIL Series routers vulnerable in RADIUS authentication"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…