In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Digi
Subscribe
|
6350-sr
Subscribe
6350-sr Firmware
Subscribe
Cm
Subscribe
Cm Firmware
Subscribe
Connect Es
Subscribe
Connect Es Firmware
Subscribe
Connectport Lts 8\/16\/32
Subscribe
Connectport Lts 8\/16\/32 Firmware
Subscribe
Connectport Ts 8\/16
Subscribe
Connectport Ts 8\/16 Firmware
Subscribe
One Ia
Subscribe
One Ia Firmware
Subscribe
One Iap
Subscribe
One Iap Firmware
Subscribe
One Iap Haz
Subscribe
One Iap Haz Firmware
Subscribe
Passport Integrated Console Server
Subscribe
Passport Integrated Console Server Firmware
Subscribe
Portserver Ts
Subscribe
Portserver Ts Firmware
Subscribe
Portserver Ts M Mei
Subscribe
Portserver Ts M Mei Firmware
Subscribe
Portserver Ts Mei
Subscribe
Portserver Ts Mei Firmware
Subscribe
Portserver Ts Mei Hardened
Subscribe
Portserver Ts Mei Hardened Firmware
Subscribe
Portserver Ts P Mei
Subscribe
Portserver Ts P Mei Firmware
Subscribe
Realport
Subscribe
Transport Wr11 Xt
Subscribe
Transport Wr11 Xt Firmware
Subscribe
Wr21
Subscribe
Wr21 Firmware
Subscribe
Wr31
Subscribe
Wr31 Firmware
Subscribe
Wr44 R
Subscribe
Wr44 R Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-23355 | In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T01:01:59.227Z
Reserved: 2021-07-16T00:00:00
Link: CVE-2021-36767
No data.
Status : Modified
Published: 2021-10-08T15:15:09.037
Modified: 2024-11-21T06:14:03.237
Link: CVE-2021-36767
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD