The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/61382 | vdb entry |
http://jvn.jp/en/jp/JVN12683004/index.html | third party advisory |
http://jvndb.jvn.jp/en/contents/2010/JVNDB-2010-000032.html | third party advisory |
http://secunia.com/advisories/41088 | third party advisory |
http://www.seil.jp/seilseries/security/2010/a00875.php | vendor advisory |