First published: Fri Jan 17 2025(Updated: )
All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.9.19 are vulnerable to cross-site request forgery (CSRF). An external attacker with no access to the device can force the end user into submitting a "setconf" method request, not requiring any CSRF token, which can lead into denial of service on the device.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
ETIC Telecom RAS | <4.5.0 | 4.5.0 |
ETIC Telecom RAS | <4.9.19 | 4.9.19 |
ETIC Telecom recommends updating the affected device firmware to version 4.9.19 https://www.etictelecom.com/en/softwares-download/ or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26153 is classified as a high severity vulnerability due to its potential to allow cross-site request forgery attacks.
To mitigate CVE-2024-26153, upgrade ETIC Telecom Remote Access Server (RAS) to version 4.9.19 or later.
Any users of ETIC Telecom Remote Access Server versions prior to 4.9.19 are affected by CVE-2024-26153.
CVE-2024-26153 enables cross-site request forgery (CSRF) attacks, allowing external attackers to manipulate user sessions.
No, CVE-2024-26153 can be exploited by external attackers with no access to the device, making it particularly dangerous.