Vulnerability Details CVE-2022-41607
All versions of ETIC Telecom Remote Access Server (RAS) 4.5.0 and prior’s application programmable interface (API) is vulnerable to directory traversal through several different methods. This could allow an attacker to read sensitive files from the server, including SSH private keys, passwords, scripts, python objects, database files, and more.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 38.0%
CVSS Severity
CVSS v3 Score 6.2
Products affected by CVE-2022-41607
-
cpe:2.3:h:etictelecom:ras-c-100-lw:-
-
cpe:2.3:h:etictelecom:ras-e-100:-
-
cpe:2.3:h:etictelecom:ras-e-220:-
-
cpe:2.3:h:etictelecom:ras-e-400:-
-
cpe:2.3:h:etictelecom:ras-ec-220-lw:-
-
cpe:2.3:h:etictelecom:ras-ec-400-lw:-
-
cpe:2.3:h:etictelecom:ras-ec-480-lw:-
-
cpe:2.3:h:etictelecom:ras-ecw-220-lw:-
-
cpe:2.3:h:etictelecom:ras-ecw-400-lw:-
-
cpe:2.3:h:etictelecom:ras-ew-100:-
-
cpe:2.3:h:etictelecom:ras-ew-220:-
-
cpe:2.3:h:etictelecom:ras-ew-400:-
-
cpe:2.3:h:etictelecom:rfm-e:-
-
cpe:2.3:o:etictelecom:remote_access_server_firmware:4.5.0