CVE-2023-4299

Digi RealPort Protocol is vulnerable to a replay attack that may allow an attacker to bypass authentication to access connected equipment.

ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9 CRITICAL
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
icscertCNA
9 CRITICAL
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 2%
VendorProductVersion
digirealport
𝑥
≤ 1.9-40
digirealport
𝑥
≤ 4.8.488.0
digiconnectport_ts_8\/16_firmware
𝑥
< 2.26.2.4
digipassport_firmware
-
digiconnectport_lts_8\/16\/32_firmware
𝑥
< 1.4.9
digicm_firmware
-
digiportserver_ts_firmware
-
digiportserver_ts_mei_firmware
-
digiportserver_ts_mei_hardened_firmware
-
digiportserver_ts_m_mei_firmware
-
digiportserver_ts_p_mei_firmware
-
digione_iap_firmware
-
digione_ia_firmware
-
digione_sp_ia_firmware
-
digione_sp_firmware
-
digiwr31_firmware
-
digitransport_wr11_xt_firmware
-
digiwr44_r_firmware
-
digiwr21_firmware
-
digiconnect_es_firmware
𝑥
< 2.26.2.4
digiconnect_sp_firmware
-
𝑥
= Vulnerable software versions