CVE-2021-36767

EUVD-2021-23355
In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 55%
Affected Products (NVD)
VendorProductVersion
digirealport
𝑥
≤ 1.9-40
digirealport
𝑥
≤ 4.10.490
digiconnectport_ts_8\/16_firmware
*
digiconnectport_lts_8\/16\/32_firmware
*
digipassport_integrated_console_server_firmware
*
digicm_firmware
*
digiportserver_ts_firmware
*
digiportserver_ts_mei_firmware
*
digiportserver_ts_mei_hardened_firmware
*
digiportserver_ts_m_mei_firmware
*
digi6350-sr_firmware
*
digiportserver_ts_p_mei_firmware
*
digitransport_wr11_xt_firmware
*
digione_ia_firmware
*
digiwr31_firmware
*
digiwr44_r_firmware
*
digiconnect_es_firmware
*
digiwr21_firmware
*
digione_iap_firmware
*
digione_iap_haz_firmware
*
𝑥
= Vulnerable software versions