← Back to CVEs
CVE-2021-36767
CRITICAL9.8
Description
In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published10/8/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
digi:6350-srdigi:6350-sr_firmwaredigi:cmdigi:cm_firmwaredigi:connect_esdigi:connect_es_firmwaredigi:connectport_lts_8\/16\/32digi:connectport_lts_8\/16\/32_firmwaredigi:connectport_ts_8\/16digi:connectport_ts_8\/16_firmwaredigi:one_iadigi:one_ia_firmwaredigi:one_iapdigi:one_iap_firmwaredigi:one_iap_hazdigi:one_iap_haz_firmwaredigi:passport_integrated_console_serverdigi:passport_integrated_console_server_firmwaredigi:portserver_tsdigi:portserver_ts_firmwaredigi:portserver_ts_m_meidigi:portserver_ts_m_mei_firmwaredigi:portserver_ts_meidigi:portserver_ts_mei_firmwaredigi:portserver_ts_mei_hardeneddigi:portserver_ts_mei_hardened_firmwaredigi:portserver_ts_p_meidigi:portserver_ts_p_mei_firmwaredigi:realportdigi:transport_wr11_xtdigi:transport_wr11_xt_firmwaredigi:wr21digi:wr21_firmwaredigi:wr31digi:wr31_firmwaredigi:wr44_rdigi:wr44_r_firmware
Weaknesses (CWE)
CWE-916
References
https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/main/2021-02.txt(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.