CVE-2021-36767

In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 40%
VendorProductVersion
digirealport
𝑥
≤ 1.9-40
digirealport
𝑥
≤ 4.10.490
digiconnectport_ts_8\/16_firmware
*
digiconnectport_lts_8\/16\/32_firmware
*
digipassport_integrated_console_server_firmware
*
digicm_firmware
*
digiportserver_ts_firmware
*
digiportserver_ts_mei_firmware
*
digiportserver_ts_mei_hardened_firmware
*
digiportserver_ts_m_mei_firmware
*
digi6350-sr_firmware
*
digiportserver_ts_p_mei_firmware
*
digitransport_wr11_xt_firmware
*
digione_ia_firmware
*
digiwr31_firmware
*
digiwr44_r_firmware
*
digiconnect_es_firmware
*
digiwr21_firmware
*
digione_iap_firmware
*
digione_iap_haz_firmware
*
𝑥
= Vulnerable software versions