Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2022-43061 | All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior’s web portal is vulnerable to accepting malicious firmware packages that could provide a backdoor to an attacker and provide privilege escalation to the device. |
Solution
ETIC Telecom recommends updating the firmware of the affected devices to the following versions: * ETIC Telecom RAS: version 4.7.0 or later https://www.etictelecom.com/en/softwares-download/ For the installed devices, ETIC Telecom recommends: * For all firmware versions 4.7.0 and above, there is a code signature verification for firmware packages. For versions prior to 4.7.0, to reduce the attack surface, we advise the user to verify: (1) That the downloaded firmware comes from a trusted source (ETIC Telecom web site), and (2) The hash of the firmware files.
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-307-01 |
![]() ![]() |
Wed, 16 Apr 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 16 Sep 2024 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior’s web portal is vulnerable to accepting malicious firmware packages that could provide a backdoor to an attacker and provide privilege escalation to the device. | All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior’s web portal is vulnerable to accepting malicious firmware packages that could provide a backdoor to an attacker and provide privilege escalation to the device. |

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T17:43:14.326Z
Reserved: 2022-10-26T00:00:00.000Z
Link: CVE-2022-3703

Updated: 2024-08-03T01:20:57.038Z

Status : Modified
Published: 2022-11-10T22:15:14.647
Modified: 2024-11-21T07:20:04.203
Link: CVE-2022-3703

No data.

No data.