Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cgw6-gwvc-637r

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address.

The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address.

EPSS

Процентиль: 50%
0.00272
Низкий

Связанные уязвимости

nvd
больше 15 лет назад

The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address.

EPSS

Процентиль: 50%
0.00272
Низкий