All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior’s web portal is vulnerable to accepting malicious firmware packages that could provide a backdoor to an attacker and provide privilege escalation to the device.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-307-01 | Patch Third Party Advisory US Government Resource |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-307-01 | Patch Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2022-11-10 22:15
Updated : 2024-11-21 07:20
NVD link : CVE-2022-3703
Mitre link : CVE-2022-3703
CVE.ORG link : CVE-2022-3703
JSON object : View
Products Affected
etictelecom
- ras-c-100-lw
- ras-ew-100
- ras-ew-220
- ras-e-220
- ras-ecw-220-lw
- ras-ec-480-lw
- ras-ew-400
- ras-ec-220-lw
- remote_access_server_firmware
- ras-e-100
- ras-ecw-400-lw
- ras-e-400
- ras-ec-400-lw
- rfm-e
CWE
CWE-345
Insufficient Verification of Data Authenticity