are vulnerable to cross-site request forgery (CSRF). An external
attacker with no access to the device can force the end user into
submitting a "setconf" method request, not requiring any CSRF token,
which can lead into denial of service on the device.
No analysis available yet.
Vendor Solution
ETIC Telecom recommends updating the affected device firmware to version 4.9.19 https://www.etictelecom.com/en/softwares-download/ or later.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-23430 | All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.9.19 are vulnerable to cross-site request forgery (CSRF). An external attacker with no access to the device can force the end user into submitting a "setconf" method request, not requiring any CSRF token, which can lead into denial of service on the device. |
Wed, 30 Jul 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Etictelecom
Etictelecom remote Access Server Firmware |
|
| CPEs | cpe:2.3:o:etictelecom:remote_access_server_firmware:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Etictelecom
Etictelecom remote Access Server Firmware |
Tue, 21 Jan 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Jan 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.9.19 are vulnerable to cross-site request forgery (CSRF). An external attacker with no access to the device can force the end user into submitting a "setconf" method request, not requiring any CSRF token, which can lead into denial of service on the device. | |
| Title | ETIC Telecom Remote Access Server (RAS) Cross-Site Request Forgery | |
| Weaknesses | CWE-352 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-01-21T14:45:48.666Z
Reserved: 2024-02-14T22:03:32.379Z
Link: CVE-2024-26153
Updated: 2025-01-21T14:45:45.196Z
Status : Analyzed
Published: 2025-01-17T17:15:10.927
Modified: 2025-07-30T17:15:26.473
Link: CVE-2024-26153
No data.
OpenCVE Enrichment
No data.
EUVD