Description

ETIC Telecom RAS versions 4.7.0 and prior the web management portal authentication disabled by default. This could allow an attacker with adjacent network access to alter the configuration of the device or cause a denial-of-service condition.

Published: 2023-08-23
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Update to ETIC Telecom RAS: version 4.9.0 or later https://www.etictelecom.com/en/softwares-download/


Vendor Workaround

ETIC Telecom recommends enabling the authentication mechanism on the administration interface. This can be done on the page “> Setup > Security > Administration right” by creating an administrator on the “List of administrators” table, enabling the parameter “Password protect the configuration interface,” then setting the parameter “Protocols to use for configuration” to “HTTPs only”. NOTE: for firmware versions 4.9.0 or later, enabling the administration protection is mandatory after the first product start.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-44115 ETIC Telecom RAS versions 4.7.0 and prior the web management portal authentication disabled by default. This could allow an attacker with adjacent network access to alter the configuration of the device or cause a denial-of-service condition.
History

Mon, 30 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Etictelecom Ras-c-100-lw Ras-e-100 Ras-e-220 Ras-e-400 Ras-ec-220-lw Ras-ec-400-lw Ras-ec-480-lw Ras-ecw-220-lw Ras-ecw-400-lw Ras-ew-100 Ras-ew-220 Ras-ew-400 Remote Access Server Firmware Rfm-e
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-09-30T19:13:47.408Z

Reserved: 2023-06-28T20:05:19.353Z

Link: CVE-2023-3453

cve-icon Vulnrichment

Updated: 2024-08-02T06:55:03.492Z

cve-icon NVD

Status : Modified

Published: 2023-08-23T22:15:08.930

Modified: 2024-11-21T08:17:18.023

Link: CVE-2023-3453

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses