All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior’s web portal is vulnerable to accepting malicious firmware packages that could provide a backdoor to an attacker and provide privilege escalation to the device.
References
| Link | Resource |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-307-01 | Patch Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
| AND |
|
History
01 Feb 2024, 18:17
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:etictelecom:remote_access_server_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-ecw-400-lw:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-e-100:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-ec-220-lw:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-e-220:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-e-400:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-ew-400:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-ecw-220-lw:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:rfm-e:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-c-100-lw:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-ec-400-lw:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-ew-220:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-ew-100:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-ec-480-lw:-:*:*:*:*:*:*:* |
|
| First Time |
Etictelecom ras-e-220
Etictelecom ras-ecw-220-lw Etictelecom rfm-e Etictelecom ras-c-100-lw Etictelecom ras-ew-100 Etictelecom ras-e-400 Etictelecom ras-ec-480-lw Etictelecom ras-ec-400-lw Etictelecom ras-ecw-400-lw Etictelecom ras-ew-400 Etictelecom ras-ec-220-lw Etictelecom ras-e-100 Etictelecom ras-ew-220 Etictelecom remote Access Server Firmware |
Information
Published : 2022-11-10 22:15
Updated : 2024-02-01 18:17
NVD link : CVE-2022-3703
Mitre link : CVE-2022-3703
CVE.ORG link : CVE-2022-3703
JSON object : View
Products Affected
etictelecom
- ras-e-100
- ras-e-220
- ras-ew-100
- rfm-e
- ras-ecw-220-lw
- ras-ecw-400-lw
- ras-ew-220
- ras-e-400
- ras-ew-400
- remote_access_server_firmware
- ras-ec-400-lw
- ras-ec-220-lw
- ras-c-100-lw
- ras-ec-480-lw
CWE
CWE-345
Insufficient Verification of Data Authenticity
