9.8
CVSSv3

CVE-2021-36767

Published: 08/10/2021 Updated: 25/09/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

In Digi RealPort up to and including 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

digi realport

digi connectport_ts_8\\/16_firmware

digi connectport_lts_8\\/16\\/32_firmware

digi passport_integrated_console_server_firmware

digi cm_firmware

digi portserver_ts_firmware

digi portserver_ts_mei_firmware

digi portserver_ts_mei_hardened_firmware

digi portserver_ts_m_mei_firmware

digi 6350-sr_firmware

digi portserver_ts_p_mei_firmware

digi transport_wr11_xt_firmware

digi one_ia_firmware

digi wr31_firmware

digi wr44_r_firmware

digi connect_es_firmware

digi wr21_firmware

digi one_iap_firmware

digi one_iap_haz_firmware