First published: Fri Jan 17 2025(Updated: )
All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 are vulnerable to reflected cross site scripting (XSS) attacks in get view method under view parameter. The ETIC RAS web server uses dynamic pages that get their input from the client side and reflect the input in their response to the client.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
ETIC Telecom RAS | <4.5.0 | 4.5.0 |
ETIC Telecom RAS | <4.9.19 | 4.9.19 |
This issue has been fixed in version 4.5.0. Update to firmware version 4.5.0 https://www.etictelecom.com/en/softwares-download/ and above.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26157 is classified as a high severity vulnerability due to its potential for reflected cross-site scripting (XSS) attacks.
To fix CVE-2024-26157, upgrade the ETIC Telecom Remote Access Server (RAS) to version 4.5.0 or later.
All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 are affected by CVE-2024-26157.
CVE-2024-26157 is a reflected cross-site scripting (XSS) vulnerability impacting the input handling in the ETIC RAS web server.
The impact of CVE-2024-26157 includes potential unauthorized access and control over affected web applications through crafted input.