{ "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", "CVE_data_meta": { "ID": "CVE-2022-41607", "ASSIGNER": "ics-cert@hq.dhs.gov", "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", "value": "All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior\u2019s application programmable interface (API) is vulnerable to directory traversal through several different methods. This could allow an attacker to read sensitive files from the server, including SSH private keys, passwords, scripts, python objects, database files, and more.\n\n" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22 Path Traversal", "cweId": "CWE-22" } ] } ] }, "affects": { "vendor": { "vendor_data": [ { "vendor_name": "ETIC Telecom", "product": { "product_data": [ { "product_name": "Remote Access Server (RAS)", "version": { "version_data": [ { "version_affected": "<=", "version_name": "0", "version_value": "4.5.0" } ] } } ] } } ] } }, "references": { "reference_data": [ { "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-307-01", "refsource": "MISC", "name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-307-01" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "source": { "discovery": "EXTERNAL" }, "solution": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n
ETIC Telecom recommends updating the firmware of the affected devices to the following versions:
ETIC Telecom RAS: version 4.7.0 or later