Vulnerability Details CVE-2010-2363
The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 50.4%
CVSS Severity
CVSS v2 Score 5.8
Products affected by CVE-2010-2363
-
cpe:2.3:a:iij:seil/b1_firmware:1.00
-
cpe:2.3:a:iij:seil/b1_firmware:2.01
-
cpe:2.3:a:iij:seil/b1_firmware:2.10
-
cpe:2.3:a:iij:seil/b1_firmware:2.20
-
cpe:2.3:a:iij:seil/b1_firmware:2.30
-
cpe:2.3:a:iij:seil/b1_firmware:2.40
-
cpe:2.3:a:iij:seil/b1_firmware:2.41
-
cpe:2.3:a:iij:seil/b1_firmware:2.42
-
cpe:2.3:a:iij:seil/b1_firmware:2.50
-
cpe:2.3:a:iij:seil/b1_firmware:2.51
-
cpe:2.3:a:iij:seil/b1_firmware:2.52
-
cpe:2.3:a:iij:seil/b1_firmware:2.60
-
cpe:2.3:a:iij:seil/b1_firmware:2.61
-
cpe:2.3:a:iij:seil/b1_firmware:2.62
-
cpe:2.3:a:iij:seil/b1_firmware:2.63
-
cpe:2.3:a:iij:seil/b1_firmware:2.70
-
cpe:2.3:a:iij:seil/b1_firmware:2.72
-
cpe:2.3:a:iij:seil/x1_firmware:1.10
-
cpe:2.3:a:iij:seil/x1_firmware:1.11
-
cpe:2.3:a:iij:seil/x1_firmware:1.20
-
cpe:2.3:a:iij:seil/x1_firmware:1.21
-
cpe:2.3:a:iij:seil/x1_firmware:1.22
-
cpe:2.3:a:iij:seil/x1_firmware:1.30
-
cpe:2.3:a:iij:seil/x1_firmware:1.31
-
cpe:2.3:a:iij:seil/x1_firmware:1.32
-
cpe:2.3:a:iij:seil/x1_firmware:1.40
-
cpe:2.3:a:iij:seil/x1_firmware:1.41
-
cpe:2.3:a:iij:seil/x1_firmware:1.43
-
cpe:2.3:a:iij:seil/x1_firmware:1.44
-
cpe:2.3:a:iij:seil/x1_firmware:2.10
-
cpe:2.3:a:iij:seil/x1_firmware:2.20
-
cpe:2.3:a:iij:seil/x1_firmware:2.30
-
cpe:2.3:a:iij:seil/x1_firmware:2.40
-
cpe:2.3:a:iij:seil/x1_firmware:2.41
-
cpe:2.3:a:iij:seil/x1_firmware:2.42
-
cpe:2.3:a:iij:seil/x1_firmware:2.50
-
cpe:2.3:a:iij:seil/x1_firmware:2.51
-
cpe:2.3:a:iij:seil/x1_firmware:2.52
-
cpe:2.3:a:iij:seil/x1_firmware:2.60
-
cpe:2.3:a:iij:seil/x1_firmware:2.61
-
cpe:2.3:a:iij:seil/x1_firmware:2.62
-
cpe:2.3:a:iij:seil/x1_firmware:2.63
-
cpe:2.3:a:iij:seil/x1_firmware:2.70
-
cpe:2.3:a:iij:seil/x1_firmware:2.72
-
cpe:2.3:a:iij:seil/x1_firmware:2.73
-
cpe:2.3:a:iij:seil/x2_firmware:1.00
-
cpe:2.3:a:iij:seil/x2_firmware:1.10
-
cpe:2.3:a:iij:seil/x2_firmware:1.11
-
cpe:2.3:a:iij:seil/x2_firmware:1.20
-
cpe:2.3:a:iij:seil/x2_firmware:1.21
-
cpe:2.3:a:iij:seil/x2_firmware:1.22
-
cpe:2.3:a:iij:seil/x2_firmware:1.30
-
cpe:2.3:a:iij:seil/x2_firmware:1.31
-
cpe:2.3:a:iij:seil/x2_firmware:1.32
-
cpe:2.3:a:iij:seil/x2_firmware:1.40
-
cpe:2.3:a:iij:seil/x2_firmware:1.41
-
cpe:2.3:a:iij:seil/x2_firmware:1.43
-
cpe:2.3:a:iij:seil/x2_firmware:1.44
-
cpe:2.3:a:iij:seil/x2_firmware:2.10
-
cpe:2.3:a:iij:seil/x2_firmware:2.20
-
cpe:2.3:a:iij:seil/x2_firmware:2.30
-
cpe:2.3:a:iij:seil/x2_firmware:2.40
-
cpe:2.3:a:iij:seil/x2_firmware:2.41
-
cpe:2.3:a:iij:seil/x2_firmware:2.42
-
cpe:2.3:a:iij:seil/x2_firmware:2.50
-
cpe:2.3:a:iij:seil/x2_firmware:2.51
-
cpe:2.3:a:iij:seil/x2_firmware:2.52
-
cpe:2.3:a:iij:seil/x2_firmware:2.60
-
cpe:2.3:a:iij:seil/x2_firmware:2.61
-
cpe:2.3:a:iij:seil/x2_firmware:2.62
-
cpe:2.3:a:iij:seil/x2_firmware:2.63
-
cpe:2.3:a:iij:seil/x2_firmware:2.70
-
cpe:2.3:a:iij:seil/x2_firmware:2.72
-
-
-