In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.

Project Subscriptions

Vendors Products
6350-sr Subscribe
6350-sr Firmware Subscribe
Cm Firmware Subscribe
Connect Es Subscribe
Connect Es Firmware Subscribe
Connectport Lts 8\/16\/32 Subscribe
Connectport Lts 8\/16\/32 Firmware Subscribe
Connectport Ts 8\/16 Subscribe
Connectport Ts 8\/16 Firmware Subscribe
One Ia Firmware Subscribe
One Iap Subscribe
One Iap Firmware Subscribe
One Iap Haz Subscribe
One Iap Haz Firmware Subscribe
Passport Integrated Console Server Subscribe
Passport Integrated Console Server Firmware Subscribe
Portserver Ts Subscribe
Portserver Ts Firmware Subscribe
Portserver Ts M Mei Subscribe
Portserver Ts M Mei Firmware Subscribe
Portserver Ts Mei Subscribe
Portserver Ts Mei Firmware Subscribe
Portserver Ts Mei Hardened Subscribe
Portserver Ts Mei Hardened Firmware Subscribe
Portserver Ts P Mei Subscribe
Portserver Ts P Mei Firmware Subscribe
Realport Subscribe
Transport Wr11 Xt Subscribe
Transport Wr11 Xt Firmware Subscribe
Wr21 Firmware Subscribe
Wr31 Firmware Subscribe
Wr44 R Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-23355 In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T01:01:59.227Z

Reserved: 2021-07-16T00:00:00

Link: CVE-2021-36767

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-10-08T15:15:09.037

Modified: 2024-11-21T06:14:03.237

Link: CVE-2021-36767

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses