CVE-2024-26155

All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 expose clear text credentials in the web portal. An attacker can access the ETIC RAS web portal and view the HTML code, which is configured to be hidden, thus allowing a connection to the ETIC RAS ssh server, which could enable an attacker to perform actions on the device.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:o:etictelecom:remote_access_server_firmware:*:*:*:*:*:*:*:*

History

30 Jul 2025, 17:11

Type Values Removed Values Added
Summary
  • (es) Todas las versiones de ETIC Telecom Remote Access Server (RAS) anteriores a la 4.5.0 exponen credenciales de texto sin formato en el portal web. Un atacante puede acceder al portal web de ETIC RAS ??y ver el código HTML, que está configurado para estar oculto, lo que permite una conexión al servidor ssh de ETIC RAS, lo que podría permitir a un atacante realizar acciones en el dispositivo.
References () https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01 - () https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01 - Third Party Advisory, US Government Resource
CPE cpe:2.3:o:etictelecom:remote_access_server_firmware:*:*:*:*:*:*:*:*
First Time Etictelecom remote Access Server Firmware
Etictelecom

17 Jan 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-17 17:15

Updated : 2025-07-30 17:11


NVD link : CVE-2024-26155

Mitre link : CVE-2024-26155

CVE.ORG link : CVE-2024-26155


JSON object : View

Products Affected

etictelecom

  • remote_access_server_firmware
CWE
CWE-319

Cleartext Transmission of Sensitive Information