All versions of ETIC Telecom Remote Access Server (RAS)...
Moderate severity
Unreviewed
Published
Jan 17, 2025
to the GitHub Advisory Database
•
Updated Jan 17, 2025
Description
Published by the National Vulnerability Database
Jan 17, 2025
Published to the GitHub Advisory Database
Jan 17, 2025
Last updated
Jan 17, 2025
All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0
expose clear text credentials in the web portal. An attacker can access
the ETIC RAS web portal and view the HTML code, which is configured to
be hidden, thus allowing a connection to the ETIC RAS ssh server, which
could enable an attacker to perform actions on the device.
References