- What is the severity of CVE-2022-3703?
- CVE-2022-3703 has been scored as a high severity vulnerability.
- How to fix CVE-2022-3703?
- To fix CVE-2022-3703: ETIC Telecom recommends updating the firmware of the affected devices to the following versions: * ETIC Telecom RAS: version 4.7.0 or later https://www.etictelecom.com/en/softwares-download/ For the installed devices, ETIC Telecom recommends: * For all firmware versions 4.7.0 and above, there is a code signature verification for firmware packages. For versions prior to 4.7.0, to reduce the attack surface, we advise the user to verify: (1) That the downloaded firmware comes from a trusted source (ETIC Telecom web site), and (2) The hash of the firmware files.
- Is CVE-2022-3703 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2022-3703 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2022-3703?
- CVE-2022-3703 affects ETIC Telecom Remote Access Server (RAS).