The IPv6 Unicast Reverse Path Forwarding (RPF) implementation on the SEIL/X1, SEIL/X2, and SEIL/B1 routers with firmware 1.00 through 2.73, when strict mode is used, does not properly drop packets, which might allow remote attackers to bypass intended access restrictions via a spoofed IP address.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published: 2010-08-30T19:00:00
Updated: 2024-08-07T02:32:16.315Z
Reserved: 2010-06-21T00:00:00
Link: CVE-2010-2363

No data.

Status : Deferred
Published: 2010-08-30T20:00:01.983
Modified: 2025-04-11T00:51:21.963
Link: CVE-2010-2363

No data.