CVE-2021-36767

Severity CVSS v4.0:
Pending analysis
Type:
CWE-916 Use of Password Hash With Insufficient Computational Effort
Publication date:
08/10/2021
Last modified:
25/09/2023

Description

In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:digi:realport:*:*:*:*:*:linux:*:* 1.9-40 (including)
cpe:2.3:a:digi:realport:*:*:*:*:*:windows:*:* 4.10.490 (including)
cpe:2.3:o:digi:connectport_ts_8\/16_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:connectport_ts_8\/16:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:connectport_lts_8\/16\/32_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:connectport_lts_8\/16\/32:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:passport_integrated_console_server_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:passport_integrated_console_server:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:cm_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:cm:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:portserver_ts_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:portserver_ts:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:portserver_ts_mei_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:portserver_ts_mei:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:portserver_ts_mei_hardened_firmware:*:*:*:*:*:*:*:*