The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
21 Nov 2024, 01:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://jvn.jp/en/jp/JVN40079308/index.html - | |
References | () http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html - | |
References | () http://osvdb.org/97619 - | |
References | () http://www.seil.jp/support/security/a01388.html - Vendor Advisory |
Information
Published : 2013-10-01 17:55
Updated : 2024-11-21 01:56
NVD link : CVE-2013-4708
Mitre link : CVE-2013-4708
CVE.ORG link : CVE-2013-4708
JSON object : View
Products Affected
iij
- seil\/x1
- seil\/turbo
- seil\/x86
- seil\/b1
- seil\/neu_2fe_plus
- seil\%2fneu_2fe_plus_firmware
- seil\%2fturbo_firmware
- seil\%2fx86_firmware
- seil\%2fx1_firmware
- seil\%2fb1_firmware
- seil\%2fx2_firmware
- seil\/x2
CWE
CWE-310
Cryptographic Issues