All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0
expose clear text credentials in the web portal. An attacker can access
the ETIC RAS web portal and view the HTML code, which is configured to
be hidden, thus allowing a connection to the ETIC RAS ssh server, which
could enable an attacker to perform actions on the device.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01 | Third Party Advisory US Government Resource |
Configurations
History
30 Jul 2025, 17:11
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01 - Third Party Advisory, US Government Resource | |
CPE | cpe:2.3:o:etictelecom:remote_access_server_firmware:*:*:*:*:*:*:*:* | |
First Time |
Etictelecom remote Access Server Firmware
Etictelecom |
17 Jan 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-17 17:15
Updated : 2025-07-30 17:11
NVD link : CVE-2024-26155
Mitre link : CVE-2024-26155
CVE.ORG link : CVE-2024-26155
JSON object : View
Products Affected
etictelecom
- remote_access_server_firmware
CWE
CWE-319
Cleartext Transmission of Sensitive Information