The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2010-08-30T19:00:00
Updated: 2024-08-07T02:32:16.315Z
Reserved: 2010-06-21T00:00:00
Link: CVE-2010-2363
Vulnrichment
No data.
NVD
Status : Modified
Published: 2010-08-30T20:00:01.983
Modified: 2024-11-21T01:16:30.400
Link: CVE-2010-2363
Redhat
No data.