SEIL routers with firmware SEIL/x86 1.00 through 2.35, SEIL/X1 2.30 through 3.75, SEIL/X2 2.30 through 3.75, and SEIL/B1 2.30 through 3.75, when the http-proxy and application-gateway features are enabled, do not properly handle the CONNECT command, which allows remote attackers to bypass intended URL restrictions via a TCP session.
Metrics
No CVSS v4.0
No CVSS v3.1
No CVSS v3.0
Access Vector Network
Access Complexity High
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
AV:N/AC:H/Au:N/C:N/I:P/A:N
This CVE is not in the KEV list.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
Vendors | Products |
---|---|
Seil |
|
Configuration 1 [-]
|
No data.
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: jpcert
Published: 2012-06-15T19:00:00Z
Updated: 2024-09-16T17:34:25.260Z
Reserved: 2012-05-14T00:00:00Z
Link: CVE-2012-2632
Vulnrichment
No data.
NVD
Status : Modified
Published: 2012-06-15T19:55:01.530
Modified: 2024-11-21T01:39:19.670
Link: CVE-2012-2632
Redhat
No data.