CVE-2022-41607
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
10/11/2022
Last modified:
16/09/2024
Description
All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior’s application programmable interface (API) is vulnerable to directory traversal through several different methods. This could allow an attacker to read sensitive files from the server, including SSH private keys, passwords, scripts, python objects, database files, and more.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:etictelecom:remote_access_server_firmware:*:*:*:*:*:*:*:* | 4.5.0 (including) | |
| cpe:2.3:h:etictelecom:ras-c-100-lw:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:etictelecom:ras-e-100:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:etictelecom:ras-e-220:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:etictelecom:ras-e-400:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:etictelecom:ras-ec-220-lw:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:etictelecom:ras-ec-400-lw:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:etictelecom:ras-ec-480-lw:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:etictelecom:ras-ecw-220-lw:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:etictelecom:ras-ecw-400-lw:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:etictelecom:ras-ew-100:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:etictelecom:ras-ew-220:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:etictelecom:ras-ew-400:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:etictelecom:rfm-e:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



