All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior’s application programmable interface (API) is vulnerable to directory traversal through several different methods. This could allow an attacker to read sensitive files from the server, including SSH private keys, passwords, scripts, python objects, database files, and more.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-307-01 |
|
History
Tue, 15 Oct 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Sep 2024 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior’s application programmable interface (API) is vulnerable to directory traversal through several different methods. This could allow an attacker to read sensitive files from the server, including SSH private keys, passwords, scripts, python objects, database files, and more. | All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior’s application programmable interface (API) is vulnerable to directory traversal through several different methods. This could allow an attacker to read sensitive files from the server, including SSH private keys, passwords, scripts, python objects, database files, and more. |
Status: PUBLISHED
Assigner: icscert
Published: 2022-11-10T21:31:26.863838Z
Updated: 2024-10-15T17:13:11.103Z
Reserved: 2022-09-29T00:00:00
Link: CVE-2022-41607
Updated: 2024-08-03T12:49:43.447Z
Status : Modified
Published: 2022-11-10T22:15:15.323
Modified: 2024-11-21T07:23:28.887
Link: CVE-2022-41607
No data.