The (1) CHAP and (2) MS-CHAP-V2 authentication capabilities in the PPP Access Concentrator (PPPAC) function in Internet Initiative Japan SEIL/B1 firmware 1.00 through 2.52 use the same challenge for each authentication attempt, which allows remote attackers to bypass authentication via a replay attack.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://secunia.com/advisories/37628 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/37293 | vdb entry |
http://jvn.jp/en/jp/JVN49602378/index.html | third party advisory |
http://www.osvdb.org/61118 | vdb entry |
http://www.seil.jp/seilseries/security/2009/a00697.php | vendor advisory |
http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000079.html | third party advisory |