All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior is vulnerable to malicious file upload. An attacker could take advantage of this to store malicious files on the server, which could override sensitive and useful existing files on the filesystem, fill the hard disk to full capacity, or compromise the affected device or computers with administrator level privileges connected to the affected device.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-307-01 | Patch Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
History
17 Sep 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior is vulnerable to malicious file upload. An attacker could take advantage of this to store malicious files on the server, which could override sensitive and useful existing files on the filesystem, fill the hard disk to full capacity, or compromise the affected device or computers with administrator level privileges connected to the affected device. |
28 Dec 2023, 19:14
Type | Values Removed | Values Added |
---|---|---|
First Time |
Etictelecom ras-ecw-220-lw
Etictelecom ras-e-220 Etictelecom remote Access Server Firmware Etictelecom ras-ec-480-lw Etictelecom ras-ec-220-lw Etictelecom ras-ew-220 Etictelecom ras-ew-400 Etictelecom ras-c-100-lw Etictelecom ras-ecw-400-lw Etictelecom ras-ec-400-lw Etictelecom ras-ew-100 Etictelecom ras-e-100 Etictelecom rfm-e Etictelecom ras-e-400 |
|
CPE | cpe:2.3:h:etictelecom:ras-e-400:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-ecw-220-lw:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-ew-100:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-ec-400-lw:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-ew-400:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-ew-220:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:rfm-e:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-ec-220-lw:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-ec-480-lw:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-ecw-400-lw:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-e-220:-:*:*:*:*:*:*:* cpe:2.3:o:etictelecom:remote_access_server_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-c-100-lw:-:*:*:*:*:*:*:* cpe:2.3:h:etictelecom:ras-e-100:-:*:*:*:*:*:*:* |
23 Aug 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary | All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior is vulnerable to malicious file upload. An attacker could take advantage of this to store malicious files on the server, which could override sensitive and useful existing files on the filesystem, fill the hard disk to full capacity, or compromise the affected device or computers with administrator level privileges connected to the affected device. |
Information
Published : 2022-11-10 22:15
Updated : 2024-09-17 00:15
NVD link : CVE-2022-40981
Mitre link : CVE-2022-40981
CVE.ORG link : CVE-2022-40981
JSON object : View
Products Affected
etictelecom
- ras-ecw-220-lw
- ras-e-220
- ras-ec-220-lw
- ras-ec-480-lw
- ras-e-400
- ras-e-100
- ras-ec-400-lw
- remote_access_server_firmware
- ras-ew-100
- ras-ew-220
- ras-ecw-400-lw
- ras-c-100-lw
- rfm-e
- ras-ew-400
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type