ETIC Telecom Remote Access Server (RAS) (Update B)
ETIC Telecom RAS contains multiple vulnerabilities affecting firmware integrity, configuration file validation, and web authentication. These include: firmware signature verification bypass (CVE-2022-3703), web interface authentication weakness (CVE-2022-41607), arbitrary file upload via configuration (CVE-2022-40981, CVE-2024-26156, CVE-2024-26154, CVE-2024-26155), and an unauthenticated network access issue (CVE-2024-26153). Exploitation could allow an attacker to gain command execution on the RAS device and access connected infrastructure. Patches are available for some vulnerabilities in firmware versions 4.5.0 and 4.7.0 and later; older versions have no fix available and require administrative mitigations.
- Network access to the RAS web administration interface on port 443 (HTTPS)
- For firmware attacks: ability to host a malicious firmware package or trick administrator into downloading from attacker-controlled source
- For configuration upload: access to the administration web interface (may require credentials depending on version)
- Default or weak authentication credentials if enabled
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3d0edb97-a1b7-40ae-aa90-784051886c26