{"uuid": "bed5b837-4f35-4aaf-8169-eba2aa2e0945", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26155", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2159", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-26155\n\ud83d\udd39 Description: All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nexpose clear text credentials in the web portal. An attacker can access \nthe ETIC RAS web portal and view the HTML code, which is configured to \nbe hidden, thus allowing a connection to the ETIC RAS ssh server, which \ncould enable an attacker to perform actions on the device.\n\ud83d\udccf Published: 2025-01-17T16:19:37.430Z\n\ud83d\udccf Modified: 2025-01-17T16:19:37.430Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01", "creation_timestamp": "2025-01-17T16:57:00.000000Z"}