Lucene search

K
cve[email protected]CVE-2014-7256
HistoryDec 05, 2014 - 5:59 p.m.

CVE-2014-7256

2014-12-0517:59:05
CWE-399
web.nvd.nist.gov
21
cve-2014-7256
ppp access concentrator
dial-up networking
seil routers
denial of service
nvd

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

6.9 Medium

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

80.8%

The (1) PPP Access Concentrator (PPPAC) and (2) Dial-Up Networking Internet Initiative Japan Inc. SEIL series routers SEIL/x86 Fuji 1.00 through 3.22; SEIL/X1, SEIL/X2, and SEIL/B1 1.00 through 4.62; SEIL/Turbo 1.82 through 2.18; and SEIL/neu 2FE Plus 1.82 through 2.18 allow remote attackers to cause a denial of service (restart) via crafted (a) GRE or (b) MPPE packets.

Affected configurations

NVD
Node
iijseil_plus_firmwareMatch1.82
OR
iijseil_plus_firmwareMatch1.83
OR
iijseil_plus_firmwareMatch1.84
OR
iijseil_plus_firmwareMatch1.85
OR
iijseil_plus_firmwareMatch1.86
OR
iijseil_plus_firmwareMatch1.87
OR
iijseil_plus_firmwareMatch1.88
OR
iijseil_plus_firmwareMatch1.89
OR
iijseil_plus_firmwareMatch1.90
OR
iijseil_plus_firmwareMatch1.91
OR
iijseil_plus_firmwareMatch1.92
OR
iijseil_plus_firmwareMatch1.93
OR
iijseil_plus_firmwareMatch1.94
OR
iijseil_plus_firmwareMatch1.95
OR
iijseil_plus_firmwareMatch1.96
OR
iijseil_plus_firmwareMatch1.97
OR
iijseil_plus_firmwareMatch1.98
OR
iijseil_plus_firmwareMatch1.99
OR
iijseil_plus_firmwareMatch2.01
OR
iijseil_plus_firmwareMatch2.02
OR
iijseil_plus_firmwareMatch2.03
OR
iijseil_plus_firmwareMatch2.04
OR
iijseil_plus_firmwareMatch2.05
OR
iijseil_plus_firmwareMatch2.06
OR
iijseil_plus_firmwareMatch2.07
OR
iijseil_plus_firmwareMatch2.08
OR
iijseil_plus_firmwareMatch2.09
OR
iijseil_plus_firmwareMatch2.10
OR
iijseil_plus_firmwareMatch2.11
OR
iijseil_plus_firmwareMatch2.12
OR
iijseil_plus_firmwareMatch2.13
OR
iijseil_plus_firmwareMatch2.14
OR
iijseil_plus_firmwareMatch2.15
OR
iijseil_plus_firmwareMatch2.16
OR
iijseil_plus_firmwareMatch2.17
OR
iijseil_plus_firmwareMatch2.18
AND
iijseil_plusMatch-
Node
iijseil_b1_firmwareRange4.61
AND
iijseil_b1Match-
Node
iijseil_x1_firmwareRange4.61
AND
iijseil_x1Match-
Node
iijseil_turbo_firmwareMatch1.82
OR
iijseil_turbo_firmwareMatch1.83
OR
iijseil_turbo_firmwareMatch1.84
OR
iijseil_turbo_firmwareMatch1.85
OR
iijseil_turbo_firmwareMatch1.86
OR
iijseil_turbo_firmwareMatch1.87
OR
iijseil_turbo_firmwareMatch1.88
OR
iijseil_turbo_firmwareMatch1.89
OR
iijseil_turbo_firmwareMatch1.90
OR
iijseil_turbo_firmwareMatch1.91
OR
iijseil_turbo_firmwareMatch1.92
OR
iijseil_turbo_firmwareMatch1.93
OR
iijseil_turbo_firmwareMatch1.94
OR
iijseil_turbo_firmwareMatch1.95
OR
iijseil_turbo_firmwareMatch1.96
OR
iijseil_turbo_firmwareMatch1.97
OR
iijseil_turbo_firmwareMatch1.98
OR
iijseil_turbo_firmwareMatch1.99
OR
iijseil_turbo_firmwareMatch2.00
OR
iijseil_turbo_firmwareMatch2.01
OR
iijseil_turbo_firmwareMatch2.02
OR
iijseil_turbo_firmwareMatch2.03
OR
iijseil_turbo_firmwareMatch2.04
OR
iijseil_turbo_firmwareMatch2.05
OR
iijseil_turbo_firmwareMatch2.06
OR
iijseil_turbo_firmwareMatch2.07
OR
iijseil_turbo_firmwareMatch2.08
OR
iijseil_turbo_firmwareMatch2.09
OR
iijseil_turbo_firmwareMatch2.10
OR
iijseil_turbo_firmwareMatch2.11
OR
iijseil_turbo_firmwareMatch2.12
OR
iijseil_turbo_firmwareMatch2.13
OR
iijseil_turbo_firmwareMatch2.14
OR
iijseil_turbo_firmwareMatch2.15
OR
iijseil_turbo_firmwareMatch2.16
OR
iijseil_turbo_firmwareMatch2.17
OR
iijseil_turbo_firmwareMatch2.18
AND
iijseil_turboMatch-
Node
iijseil_x86_fuji_firmwareRange3.21
AND
iijseil_x86_fujiMatch-
Node
iijseil_x2_firmwareRange4.61
AND
iijseil_x2Match-

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

6.9 Medium

AI Score

Confidence

High

0.007 Low

EPSS

Percentile

80.8%

Related for CVE-2014-7256