The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2010-08-30T19:00:00

Updated: 2024-08-07T02:32:16.315Z

Reserved: 2010-06-21T00:00:00

Link: CVE-2010-2363

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2010-08-30T20:00:01.983

Modified: 2017-08-17T01:32:43.103

Link: CVE-2010-2363

cve-icon Redhat

No data.