The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN49602378/index.html - | |
References | () http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000079.html - | |
References | () http://secunia.com/advisories/37628 - Vendor Advisory | |
References | () http://www.osvdb.org/61118 - | |
References | () http://www.securityfocus.com/bid/37293 - | |
References | () http://www.seil.jp/seilseries/security/2009/a00697.php - Vendor Advisory |
Information
Published : 2009-12-23 21:30
Updated : 2024-11-21 01:09
NVD link : CVE-2009-4409
Mitre link : CVE-2009-4409
CVE.ORG link : CVE-2009-4409
JSON object : View
Products Affected
iij
- seil\/b1
CWE
CWE-287
Improper Authentication