In Digi RealPort up to and including 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
digi realport |
||
digi connectport_ts_8\\/16_firmware |
||
digi connectport_lts_8\\/16\\/32_firmware |
||
digi passport_integrated_console_server_firmware |
||
digi cm_firmware |
||
digi portserver_ts_firmware |
||
digi portserver_ts_mei_firmware |
||
digi portserver_ts_mei_hardened_firmware |
||
digi portserver_ts_m_mei_firmware |
||
digi 6350-sr_firmware |
||
digi portserver_ts_p_mei_firmware |
||
digi transport_wr11_xt_firmware |
||
digi one_ia_firmware |
||
digi wr31_firmware |
||
digi wr44_r_firmware |
||
digi connect_es_firmware |
||
digi wr21_firmware |
||
digi one_iap_firmware |
||
digi one_iap_haz_firmware |