CVE-2023-4299
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
31/08/2023
Last modified:
06/09/2023
Description
<br />
Digi RealPort Protocol is vulnerable to a replay attack that may allow an attacker to bypass authentication to access connected equipment.<br />
<br />
Impact
Base Score 3.x
8.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:digi:realport:*:*:*:*:*:linux:*:* | 1.9-40 (including) | |
| cpe:2.3:a:digi:realport:*:*:*:*:*:windows:*:* | 4.8.488.0 (including) | |
| cpe:2.3:o:digi:connectport_ts_8\/16_firmware:*:*:*:*:*:*:*:* | 2.26.2.4 (excluding) | |
| cpe:2.3:h:digi:connectport_ts_8\/16:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:digi:passport_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:digi:passport:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:digi:connectport_lts_8\/16\/32_firmware:*:*:*:*:*:*:*:* | 1.4.9 (excluding) | |
| cpe:2.3:h:digi:connectport_lts_8\/16\/32:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:digi:cm_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:digi:cm:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:digi:portserver_ts_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:digi:portserver_ts:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:digi:portserver_ts_mei_firmware:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:digi:portserver_ts_mei:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:digi:portserver_ts_mei_hardened_firmware:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



