In Digi RealPort up to and including 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
digi realport |
||
digi connectport ts 8/16 firmware |
||
digi connectport lts 8/16/32 firmware |
||
digi passport integrated console server firmware |
||
digi cm firmware |
||
digi portserver ts firmware |
||
digi portserver ts mei firmware |
||
digi portserver ts mei hardened firmware |
||
digi portserver ts m mei firmware |
||
digi 6350-sr firmware |
||
digi portserver ts p mei firmware |
||
digi transport wr11 xt firmware |
||
digi one ia firmware |
||
digi wr31 firmware |
||
digi wr44 r firmware |
||
digi connect es firmware |
||
digi wr21 firmware |
||
digi one iap firmware |
||
digi one iap haz firmware |