CVE-2021-36767
08.10.2021, 15:15
In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.Enginsight
Vendor | Product | Version |
---|---|---|
digi | realport | 𝑥 ≤ 1.9-40 |
digi | realport | 𝑥 ≤ 4.10.490 |
digi | connectport_ts_8\/16_firmware | * |
digi | connectport_lts_8\/16\/32_firmware | * |
digi | passport_integrated_console_server_firmware | * |
digi | cm_firmware | * |
digi | portserver_ts_firmware | * |
digi | portserver_ts_mei_firmware | * |
digi | portserver_ts_mei_hardened_firmware | * |
digi | portserver_ts_m_mei_firmware | * |
digi | 6350-sr_firmware | * |
digi | portserver_ts_p_mei_firmware | * |
digi | transport_wr11_xt_firmware | * |
digi | one_ia_firmware | * |
digi | wr31_firmware | * |
digi | wr44_r_firmware | * |
digi | connect_es_firmware | * |
digi | wr21_firmware | * |
digi | one_iap_firmware | * |
digi | one_iap_haz_firmware | * |
𝑥
= Vulnerable software versions