Digi RealPort Protocol is vulnerable to a replay attack that may allow an malicious user to bypass authentication to access connected equipment.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
digi realport |
||
digi connectport_ts_8\\/16_firmware |
||
digi passport_firmware - |
||
digi connectport_lts_8\\/16\\/32_firmware |
||
digi cm_firmware - |
||
digi portserver_ts_firmware - |
||
digi portserver_ts_mei_firmware - |
||
digi portserver_ts_mei_hardened_firmware - |
||
digi portserver_ts_m_mei_firmware - |
||
digi portserver_ts_p_mei_firmware - |
||
digi one_iap_firmware - |
||
digi one_ia_firmware - |
||
digi one_sp_ia_firmware - |
||
digi one_sp_firmware - |
||
digi wr31_firmware - |
||
digi transport_wr11_xt_firmware - |
||
digi wr44_r_firmware - |
||
digi wr21_firmware - |
||
digi connect_es_firmware |
||
digi connect_sp_firmware - |