All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.9.19
are vulnerable to cross-site request forgery (CSRF). An external
attacker with no access to the device can force the end user into
submitting a "setconf" method request, not requiring any CSRF token,
which can lead into denial of service on the device.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-23430 All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.9.19 are vulnerable to cross-site request forgery (CSRF). An external attacker with no access to the device can force the end user into submitting a "setconf" method request, not requiring any CSRF token, which can lead into denial of service on the device.
Fixes

Solution

ETIC Telecom recommends updating the affected device firmware to version 4.9.19 https://www.etictelecom.com/en/softwares-download/ or later.


Workaround

No workaround given by the vendor.

History

Wed, 30 Jul 2025 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Etictelecom
Etictelecom remote Access Server Firmware
CPEs cpe:2.3:o:etictelecom:remote_access_server_firmware:*:*:*:*:*:*:*:*
Vendors & Products Etictelecom
Etictelecom remote Access Server Firmware

Tue, 21 Jan 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 17 Jan 2025 16:45:00 +0000

Type Values Removed Values Added
Description All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.9.19 are vulnerable to cross-site request forgery (CSRF). An external attacker with no access to the device can force the end user into submitting a "setconf" method request, not requiring any CSRF token, which can lead into denial of service on the device.
Title ETIC Telecom Remote Access Server (RAS) Cross-Site Request Forgery
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-01-21T14:45:48.666Z

Reserved: 2024-02-14T22:03:32.379Z

Link: CVE-2024-26153

cve-icon Vulnrichment

Updated: 2025-01-21T14:45:45.196Z

cve-icon NVD

Status : Analyzed

Published: 2025-01-17T17:15:10.927

Modified: 2025-07-30T17:15:26.473

Link: CVE-2024-26153

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.