cvelist/2023/3xxx/CVE-2023-3453.json
2023-08-23 22:00:33 +00:00

138 lines
5.4 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-3453",
"ASSIGNER": "ics-cert@hq.dhs.gov",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "\nETIC Telecom RAS versions 4.7.0 and prior the web management portal authentication disabled by default. This could allow an attacker with adjacent network access to alter the configuration of the device or cause a denial-of-service condition.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-1188 Insecure Default Initialization of Resource",
"cweId": "CWE-1188"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "ETIC Telecom",
"product": {
"product_data": [
{
"product_name": "Remote Access Server (RAS)",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "0",
"version_value": "4.7.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-208-01",
"refsource": "MISC",
"name": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-208-01"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"advisory": "ICSA-23-208-01",
"discovery": "EXTERNAL"
},
"work_around": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\n<p>ETIC Telecom recommends enabling the authentication mechanism on the administration interface. This can be done on the page \u201c&gt; Setup &gt; Security &gt; Administration right\u201d by creating an administrator on the \u201cList of administrators\u201d table, enabling the parameter \u201cPassword protect the configuration interface,\u201d then setting the parameter \u201cProtocols to use for configuration\u201d to \u201cHTTPs only\u201d.</p><p>NOTE: for firmware versions 4.9.0 or later, enabling the administration protection is mandatory after the first product start.</p>\n\n<br>"
}
],
"value": "\nETIC Telecom recommends enabling the authentication mechanism on the administration interface. This can be done on the page \u201c> Setup > Security > Administration right\u201d by creating an administrator on the \u201cList of administrators\u201d table, enabling the parameter \u201cPassword protect the configuration interface,\u201d then setting the parameter \u201cProtocols to use for configuration\u201d to \u201cHTTPs only\u201d.\n\nNOTE: for firmware versions 4.9.0 or later, enabling the administration protection is mandatory after the first product start.\n\n\n\n\n"
}
],
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to&nbsp;<span style=\"background-color: var(--wht);\">ETIC Telecom RAS: </span><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.etictelecom.com/en/softwares-download/\">version 4.9.0 or later</a>"
}
],
"value": "Update to\u00a0ETIC Telecom RAS: version 4.9.0 or later https://www.etictelecom.com/en/softwares-download/ "
}
],
"credits": [
{
"lang": "en",
"value": "Haviv Vaizman of OTORIO"
},
{
"lang": "en",
"value": "Hay Mizrachi of OTORIO"
},
{
"lang": "en",
"value": "Alik Koldobsky of OTORIO"
},
{
"lang": "en",
"value": "Ofir Manzur of OTORIO"
},
{
"lang": "en",
"value": "Nikolay Sokolik of OTORIO"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
}
]
}
}