CVE-2023-4299

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
31/08/2023
Last modified:
06/09/2023

Description

<br /> Digi RealPort Protocol is vulnerable to a replay attack that may allow an attacker to bypass authentication to access connected equipment.<br /> <br />

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:digi:realport:*:*:*:*:*:linux:*:* 1.9-40 (including)
cpe:2.3:a:digi:realport:*:*:*:*:*:windows:*:* 4.8.488.0 (including)
cpe:2.3:o:digi:connectport_ts_8\/16_firmware:*:*:*:*:*:*:*:* 2.26.2.4 (excluding)
cpe:2.3:h:digi:connectport_ts_8\/16:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:passport_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:digi:passport:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:connectport_lts_8\/16\/32_firmware:*:*:*:*:*:*:*:* 1.4.9 (excluding)
cpe:2.3:h:digi:connectport_lts_8\/16\/32:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:cm_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:digi:cm:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:portserver_ts_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:digi:portserver_ts:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:portserver_ts_mei_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:digi:portserver_ts_mei:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:portserver_ts_mei_hardened_firmware:-:*:*:*:*:*:*:*