{"vulnerability": "CVE-2024-26155", "sightings": [{"uuid": "7097d2c4-147e-4a44-94bb-33d363d38024", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26155", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113844607889168893", "content": "", "creation_timestamp": "2025-01-17T16:20:58.046899Z"}, {"uuid": "608ee187-66b7-4037-92d4-9d38c1d2d430", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26155", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfxcbuobtm2t", "content": "", "creation_timestamp": "2025-01-17T17:15:46.143975Z"}, {"uuid": "a0cb9e4d-1675-484f-bf45-a7cfed7b95da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26155", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfxgxo3x6o2k", "content": "", "creation_timestamp": "2025-01-17T18:39:32.907476Z"}, {"uuid": "bed5b837-4f35-4aaf-8169-eba2aa2e0945", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26155", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2159", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-26155\n\ud83d\udd39 Description: All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nexpose clear text credentials in the web portal. An attacker can access \nthe ETIC RAS web portal and view the HTML code, which is configured to \nbe hidden, thus allowing a connection to the ETIC RAS ssh server, which \ncould enable an attacker to perform actions on the device.\n\ud83d\udccf Published: 2025-01-17T16:19:37.430Z\n\ud83d\udccf Modified: 2025-01-17T16:19:37.430Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01", "creation_timestamp": "2025-01-17T16:57:00.000000Z"}, {"uuid": "7ca9901c-138d-4c3e-97c1-875f54526514", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26155", "type": "seen", "source": "https://t.me/cvedetector/15714", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-26155 - ETIC Telecom RAS Clear Text Credentials Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-26155 \nPublished : Jan. 17, 2025, 5:15 p.m. | 44\u00a0minutes ago \nDescription : All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0   \nexpose clear text credentials in the web portal. An attacker can access   \nthe ETIC RAS web portal and view the HTML code, which is configured to   \nbe hidden, thus allowing a connection to the ETIC RAS ssh server, which   \ncould enable an attacker to perform actions on the device. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"17 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-17T19:18:06.000000Z"}]}