CVE-2024-26153

All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.9.19 are vulnerable to cross-site request forgery (CSRF). An external attacker with no access to the device can force the end user into submitting a "setconf" method request, not requiring any CSRF token, which can lead into denial of service on the device.
References
Link Resource
https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:o:etictelecom:remote_access_server_firmware:*:*:*:*:*:*:*:*

History

30 Jul 2025, 17:15

Type Values Removed Values Added
CPE cpe:2.3:o:etictelecom:remote_access_server_firmware:*:*:*:*:*:*:*:*
Summary
  • (es) Todas las versiones de ETIC Telecom Remote Access Server (RAS) anteriores a la 4.9.19 son vulnerables a Cross-Site Request Forgery (CSRF). Un atacante externo sin acceso al dispositivo puede obligar al usuario final a enviar una solicitud de método ""setconf"", sin necesidad de ningún token CSRF, lo que puede provocar una denegación de servicio en el dispositivo.
First Time Etictelecom remote Access Server Firmware
Etictelecom
References () https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01 - () https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01 - Third Party Advisory, US Government Resource

17 Jan 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-01-17 17:15

Updated : 2025-07-30 17:15


NVD link : CVE-2024-26153

Mitre link : CVE-2024-26153

CVE.ORG link : CVE-2024-26153


JSON object : View

Products Affected

etictelecom

  • remote_access_server_firmware
CWE
CWE-352

Cross-Site Request Forgery (CSRF)