CVE-2013-4708

N/A Unknown
Published: October 01, 2013 Modified: April 29, 2026
View on NVD

Description

The PPP Access Concentrator (PPPAC) in Internet Initiative Japan Inc. SEIL/x86 1.00 through 2.80, SEIL/X1 1.00 through 4.30, SEIL/X2 1.00 through 4.30, SEIL/B1 1.00 through 4.30, SEIL/Turbo 1.80 through 2.15, and SEIL/neu 2FE Plus 1.80 through 2.15 generates predictable random numbers, which allows remote attackers to bypass RADIUS authentication by sniffing RADIUS traffic.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://jvn.jp/en/jp/JVN40079308/index.html
Source: vultures@jpcert.or.jp
http://osvdb.org/97619
Source: vultures@jpcert.or.jp
http://www.seil.jp/support/security/a01388.html
Source: vultures@jpcert.or.jp
Vendor Advisory
http://jvn.jp/en/jp/JVN40079308/index.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-000091.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://osvdb.org/97619
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.seil.jp/support/security/a01388.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory

8 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.2%
42th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

iij