TROYANOSYVIRUS
Volver a CVEs

CVE-2023-4299

CRITICAL
9.0

Descripcion

Digi RealPort Protocol is vulnerable to a replay attack that may allow an attacker to bypass authentication to access connected equipment.

Detalles CVE

Puntuacion CVSS v3.19.0
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadHIGH
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado8/31/2023
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0

Productos afectados

digi:cmdigi:cm_firmwaredigi:connect_esdigi:connect_es_firmwaredigi:connect_spdigi:connect_sp_firmwaredigi:connectport_lts_8\/16\/32digi:connectport_lts_8\/16\/32_firmwaredigi:connectport_ts_8\/16digi:connectport_ts_8\/16_firmwaredigi:one_iadigi:one_ia_firmwaredigi:one_iapdigi:one_iap_firmwaredigi:one_spdigi:one_sp_firmwaredigi:one_sp_iadigi:one_sp_ia_firmwaredigi:passportdigi:passport_firmwaredigi:portserver_tsdigi:portserver_ts_firmwaredigi:portserver_ts_m_meidigi:portserver_ts_m_mei_firmwaredigi:portserver_ts_meidigi:portserver_ts_mei_firmwaredigi:portserver_ts_mei_hardeneddigi:portserver_ts_mei_hardened_firmwaredigi:portserver_ts_p_meidigi:portserver_ts_p_mei_firmwaredigi:realportdigi:transport_wr11_xtdigi:transport_wr11_xt_firmwaredigi:wr21digi:wr21_firmwaredigi:wr31digi:wr31_firmwaredigi:wr44_rdigi:wr44_r_firmware

Debilidades (CWE)

CWE-836

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.