CVE-2023-4299
31.08.2023, 21:15
Digi RealPort Protocol is vulnerable to a replay attack that may allow an attacker to bypass authentication to access connected equipment.Enginsight
Vendor | Product | Version |
---|---|---|
digi | realport | 𝑥 ≤ 1.9-40 |
digi | realport | 𝑥 ≤ 4.8.488.0 |
digi | connectport_ts_8\/16_firmware | 𝑥 < 2.26.2.4 |
digi | passport_firmware | - |
digi | connectport_lts_8\/16\/32_firmware | 𝑥 < 1.4.9 |
digi | cm_firmware | - |
digi | portserver_ts_firmware | - |
digi | portserver_ts_mei_firmware | - |
digi | portserver_ts_mei_hardened_firmware | - |
digi | portserver_ts_m_mei_firmware | - |
digi | portserver_ts_p_mei_firmware | - |
digi | one_iap_firmware | - |
digi | one_ia_firmware | - |
digi | one_sp_ia_firmware | - |
digi | one_sp_firmware | - |
digi | wr31_firmware | - |
digi | transport_wr11_xt_firmware | - |
digi | wr44_r_firmware | - |
digi | wr21_firmware | - |
digi | connect_es_firmware | 𝑥 < 2.26.2.4 |
digi | connect_sp_firmware | - |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References