gsd-2023-3453
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
ETIC Telecom RAS versions 4.7.0 and prior the web management portal authentication disabled by default. This could allow an attacker with adjacent network access to alter the configuration of the device or cause a denial-of-service condition.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2023-3453", "id": "GSD-2023-3453" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-3453" ], "details": "\nETIC Telecom RAS versions 4.7.0 and prior the web management portal authentication disabled by default. This could allow an attacker with adjacent network access to alter the configuration of the device or cause a denial-of-service condition.\n\n", "id": "GSD-2023-3453", "modified": "2023-12-13T01:20:54.441553Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2023-3453", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Remote Access Server (RAS)", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "0", "version_value": "4.7.0" } ] } } ] }, "vendor_name": "ETIC Telecom" } ] } }, "credits": [ { "lang": "en", "value": "Haviv Vaizman of OTORIO" }, { "lang": "en", "value": "Hay Mizrachi of OTORIO" }, { "lang": "en", "value": "Alik Koldobsky of OTORIO" }, { "lang": "en", "value": "Ofir Manzur of OTORIO" }, { "lang": "en", "value": "Nikolay Sokolik of OTORIO" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "\nETIC Telecom RAS versions 4.7.0 and prior the web management portal authentication disabled by default. This could allow an attacker with adjacent network access to alter the configuration of the device or cause a denial-of-service condition.\n\n" } ] }, "generator": { "engine": "Vulnogram 0.1.0-dev" }, "impact": { "cvss": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-1188", "lang": "eng", "value": "CWE-1188 Insecure Default Initialization of Resource" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-208-01", "refsource": "MISC", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-208-01" } ] }, "solution": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to\u0026nbsp;\u003cspan style=\"background-color: var(--wht);\"\u003eETIC Telecom RAS: \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.etictelecom.com/en/softwares-download/\"\u003eversion 4.9.0 or later\u003c/a\u003e" } ], "value": "Update to\u00a0ETIC Telecom RAS: version 4.9.0 or later https://www.etictelecom.com/en/softwares-download/ " } ], "source": { "advisory": "ICSA-23-208-01", "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cp\u003eETIC Telecom recommends enabling the authentication mechanism on the administration interface. This can be done on the page \u201c\u0026gt; Setup \u0026gt; Security \u0026gt; Administration right\u201d by creating an administrator on the \u201cList of administrators\u201d table, enabling the parameter \u201cPassword protect the configuration interface,\u201d then setting the parameter \u201cProtocols to use for configuration\u201d to \u201cHTTPs only\u201d.\u003c/p\u003e\u003cp\u003eNOTE: for firmware versions 4.9.0 or later, enabling the administration protection is mandatory after the first product start.\u003c/p\u003e\n\n\u003cbr\u003e" } ], "value": "\nETIC Telecom recommends enabling the authentication mechanism on the administration interface. This can be done on the page \u201c\u003e Setup \u003e Security \u003e Administration right\u201d by creating an administrator on the \u201cList of administrators\u201d table, enabling the parameter \u201cPassword protect the configuration interface,\u201d then setting the parameter \u201cProtocols to use for configuration\u201d to \u201cHTTPs only\u201d.\n\nNOTE: for firmware versions 4.9.0 or later, enabling the administration protection is mandatory after the first product start.\n\n\n\n\n" } ] }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:etictelecom:remote_access_server_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "418E040C-258B-4D39-AF47-62E801FF6D9A", "versionEndIncluding": "4.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:etictelecom:ras-c-100-lw:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DAE45DD-78EE-4ACB-A1E5-C190BE642BDF", "vulnerable": false }, { "criteria": "cpe:2.3:h:etictelecom:ras-e-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "93F02AE2-6AC3-492E-9E91-E9F0725A1EEB", "vulnerable": false }, { "criteria": "cpe:2.3:h:etictelecom:ras-e-220:-:*:*:*:*:*:*:*", "matchCriteriaId": "C32ED13F-237B-441C-8032-F54615AEFC73", "vulnerable": false }, { "criteria": "cpe:2.3:h:etictelecom:ras-e-400:-:*:*:*:*:*:*:*", "matchCriteriaId": "86536932-B27A-4028-829D-2924CD431C54", "vulnerable": false }, { "criteria": "cpe:2.3:h:etictelecom:ras-ec-220-lw:-:*:*:*:*:*:*:*", "matchCriteriaId": "52E2D325-0AE3-4459-9F27-5CC19349F060", "vulnerable": false }, { "criteria": "cpe:2.3:h:etictelecom:ras-ec-400-lw:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB8D1AA9-42C0-4546-A02E-91B3D7A8AD4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:etictelecom:ras-ec-480-lw:-:*:*:*:*:*:*:*", "matchCriteriaId": "50EEA797-3218-44FE-8D93-178C40F4BF17", "vulnerable": false }, { "criteria": "cpe:2.3:h:etictelecom:ras-ecw-220-lw:-:*:*:*:*:*:*:*", "matchCriteriaId": "E768A79E-BBFD-47C1-8535-1F721D92575C", "vulnerable": false }, { "criteria": "cpe:2.3:h:etictelecom:ras-ecw-400-lw:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1D86798-3C5F-40A9-BF41-0602F78A027B", "vulnerable": false }, { "criteria": "cpe:2.3:h:etictelecom:ras-ew-100:-:*:*:*:*:*:*:*", "matchCriteriaId": "D12CC48E-6DAC-4412-9068-04B774540500", "vulnerable": false }, { "criteria": "cpe:2.3:h:etictelecom:ras-ew-220:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D7A25F4-412A-4D16-922F-1219B86E31A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:etictelecom:ras-ew-400:-:*:*:*:*:*:*:*", "matchCriteriaId": "32675A39-A1B3-4773-902A-6E6F8A72D16D", "vulnerable": false }, { "criteria": "cpe:2.3:h:etictelecom:rfm-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7543976-5400-4A9E-8E62-CB65FD00D0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "descriptions": [ { "lang": "en", "value": "\nETIC Telecom RAS versions 4.7.0 and prior the web management portal authentication disabled by default. This could allow an attacker with adjacent network access to alter the configuration of the device or cause a denial-of-service condition.\n\n" } ], "id": "CVE-2023-3453", "lastModified": "2023-12-28T19:26:17.687", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.7, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" } ] }, "published": "2023-08-23T22:15:08.930", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-208-01" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1188" } ], "source": "ics-cert@hq.dhs.gov", "type": "Primary" } ] } } } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.