9.8
CVSSv3

CVE-2021-36767

Published: 08/10/2021 Updated: 25/09/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

In Digi RealPort up to and including 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

digi realport

digi connectport ts 8/16 firmware

digi connectport lts 8/16/32 firmware

digi passport integrated console server firmware

digi cm firmware

digi portserver ts firmware

digi portserver ts mei firmware

digi portserver ts mei hardened firmware

digi portserver ts m mei firmware

digi 6350-sr firmware

digi portserver ts p mei firmware

digi transport wr11 xt firmware

digi one ia firmware

digi wr31 firmware

digi wr44 r firmware

digi connect es firmware

digi wr21 firmware

digi one iap firmware

digi one iap haz firmware