First published: Fri Jan 17 2025(Updated: )
All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 are vulnerable to reflected cross site scripting (XSS) attacks in the method parameter. The ETIC RAS web server uses dynamic pages that gets their input from the client side and reflects the input in its response to the client.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
ETIC Telecom RAS | <4.5.0 | 4.5.0 |
ETIC Telecom RAS | <4.9.19 | 4.9.19 |
For all firmware versions 4.5.0 https://www.etictelecom.com/en/softwares-download/ and above, this issue is fixed.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26156 has been categorized as a medium-severity vulnerability due to the risk of reflected cross-site scripting attacks.
To fix CVE-2024-26156, upgrade the ETIC Telecom RAS to version 4.5.0 or later.
Reflected cross-site scripting in CVE-2024-26156 allows attackers to inject malicious scripts into web pages that are then executed in the context of the user's browser.
All versions of ETIC Telecom RAS prior to version 4.5.0 are affected by CVE-2024-26156.
CVE-2024-26156 can be exploited for reflected cross-site scripting attacks, which can compromise user data and session integrity.