The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2010-08-30T19:00:00

Updated: 2024-08-07T02:32:16.315Z

Reserved: 2010-06-21T00:00:00

Link: CVE-2010-2363

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2010-08-30T20:00:01.983

Modified: 2025-04-11T00:51:21.963

Link: CVE-2010-2363

cve-icon Redhat

No data.