TROYANOSYVIRUS
Voltar para CVEs

CVE-2023-4299

CRITICAL
9.0

Descricao

Digi RealPort Protocol is vulnerable to a replay attack that may allow an attacker to bypass authentication to access connected equipment.

Detalhes CVE

Pontuacao CVSS v3.19.0
SeveridadeCRITICAL
Vetor CVSSCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeHIGH
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado8/31/2023
Ultima modificacao11/21/2024
Fontenvd
Avistamentos honeypot0

Produtos afetados

digi:cmdigi:cm_firmwaredigi:connect_esdigi:connect_es_firmwaredigi:connect_spdigi:connect_sp_firmwaredigi:connectport_lts_8\/16\/32digi:connectport_lts_8\/16\/32_firmwaredigi:connectport_ts_8\/16digi:connectport_ts_8\/16_firmwaredigi:one_iadigi:one_ia_firmwaredigi:one_iapdigi:one_iap_firmwaredigi:one_spdigi:one_sp_firmwaredigi:one_sp_iadigi:one_sp_ia_firmwaredigi:passportdigi:passport_firmwaredigi:portserver_tsdigi:portserver_ts_firmwaredigi:portserver_ts_m_meidigi:portserver_ts_m_mei_firmwaredigi:portserver_ts_meidigi:portserver_ts_mei_firmwaredigi:portserver_ts_mei_hardeneddigi:portserver_ts_mei_hardened_firmwaredigi:portserver_ts_p_meidigi:portserver_ts_p_mei_firmwaredigi:realportdigi:transport_wr11_xtdigi:transport_wr11_xt_firmwaredigi:wr21digi:wr21_firmwaredigi:wr31digi:wr31_firmwaredigi:wr44_rdigi:wr44_r_firmware

Fraquezas (CWE)

CWE-836

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.