CVE-2013-4708
01.10.2013, 17:55
The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic.Enginsight
Vendor | Product | Version |
---|---|---|
iij | seil\%2fx1_firmware | 1.00 |
iij | seil\%2fx1_firmware | 4.30 |
iij | seil\/x1 | * |
iij | seil\%2fb1_firmware | 1.00 |
iij | seil\%2fb1_firmware | 4.30 |
iij | seil\/b1 | * |
iij | seil\%2fx2_firmware | 1.00 |
iij | seil\%2fx2_firmware | 4.30 |
iij | seil\/x2 | * |
iij | seil\%2fx86_firmware | 1.00 |
iij | seil\%2fx86_firmware | 2.80 |
iij | seil\/x86 | * |
iij | seil\%2fturbo_firmware | 1.80 |
iij | seil\%2fturbo_firmware | 2.05 |
iij | seil\%2fturbo_firmware | 2.15 |
iij | seil\/turbo | * |
iij | seil\%2fneu_2fe_plus_firmware | 1.80 |
iij | seil\%2fneu_2fe_plus_firmware | 2.05 |
iij | seil\%2fneu_2fe_plus_firmware | 2.15 |
iij | seil\/neu_2fe_plus | * |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References