CVE-2021-36767
high-risk
Published 2021-10-08
In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.
Do I need to act?
-
0.36% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (20)
Realport
Realport
Connectport Ts 8\/16 Firmware
Connectport Lts 8\/16\/32 Firmware
Passport Integrated Console Server Firmware
Cm Firmware
Portserver Ts Firmware
Portserver Ts Mei Firmware
Portserver Ts Mei Hardened Firmware
Portserver Ts M Mei Firmware
6350-Sr Firmware
Portserver Ts P Mei Firmware
Transport Wr11 Xt Firmware
One Ia Firmware
Wr31 Firmware
Wr44 R Firmware
Connect Es Firmware
Wr21 Firmware
One Iap Firmware
One Iap Haz Firmware
Affected Vendors
References (2)
Third Party Advisory
https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/main/2021-02.txt
Third Party Advisory
https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/main/2021-02.txt
53
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
1/34 · Minimal
Exposure
20/34 · Moderate