← Voltar para CVEs
CVE-2023-4299
CRITICAL9.0
Descricao
Digi RealPort Protocol is vulnerable to a replay attack that may allow an attacker to bypass authentication to access connected equipment.
Detalhes CVE
Pontuacao CVSS v3.19.0
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeHIGH
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado8/31/2023
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0
Produtos afetados
digi:cmdigi:cm_firmwaredigi:connect_esdigi:connect_es_firmwaredigi:connect_spdigi:connect_sp_firmwaredigi:connectport_lts_8\/16\/32digi:connectport_lts_8\/16\/32_firmwaredigi:connectport_ts_8\/16digi:connectport_ts_8\/16_firmwaredigi:one_iadigi:one_ia_firmwaredigi:one_iapdigi:one_iap_firmwaredigi:one_spdigi:one_sp_firmwaredigi:one_sp_iadigi:one_sp_ia_firmwaredigi:passportdigi:passport_firmwaredigi:portserver_tsdigi:portserver_ts_firmwaredigi:portserver_ts_m_meidigi:portserver_ts_m_mei_firmwaredigi:portserver_ts_meidigi:portserver_ts_mei_firmwaredigi:portserver_ts_mei_hardeneddigi:portserver_ts_mei_hardened_firmwaredigi:portserver_ts_p_meidigi:portserver_ts_p_mei_firmwaredigi:realportdigi:transport_wr11_xtdigi:transport_wr11_xt_firmwaredigi:wr21digi:wr21_firmwaredigi:wr31digi:wr31_firmwaredigi:wr44_rdigi:wr44_r_firmware
Fraquezas (CWE)
CWE-836
Referencias
https://www.cisa.gov/news-events/ics-advisories/icsa-23-243-04(ics-cert@hq.dhs.gov)
https://www.digi.com/getattachment/resources/security/alerts/realport-cves/Dragos-Disclosure-Statement.pdf(ics-cert@hq.dhs.gov)
https://www.cisa.gov/news-events/ics-advisories/icsa-23-243-04(af854a3a-2127-422b-91ae-364da2661108)
https://www.digi.com/getattachment/resources/security/alerts/realport-cves/Dragos-Disclosure-Statement.pdf(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.