CVE-2021-36767
Severity CVSS v4.0:
Pending analysis
Type:
CWE-916
Use of Password Hash With Insufficient Computational Effort
Publication date:
08/10/2021
Last modified:
25/09/2023
Description
In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:digi:realport:*:*:*:*:*:linux:*:* | 1.9-40 (including) | |
| cpe:2.3:a:digi:realport:*:*:*:*:*:windows:*:* | 4.10.490 (including) | |
| cpe:2.3:o:digi:connectport_ts_8\/16_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:digi:connectport_ts_8\/16:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:digi:connectport_lts_8\/16\/32_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:digi:connectport_lts_8\/16\/32:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:digi:passport_integrated_console_server_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:digi:passport_integrated_console_server:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:digi:cm_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:digi:cm:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:digi:portserver_ts_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:digi:portserver_ts:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:digi:portserver_ts_mei_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:digi:portserver_ts_mei:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:digi:portserver_ts_mei_hardened_firmware:*:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



