CVE-2021-36767
CRITICALDigi RealPort <4.10.490 - Info Disclosure
Title source: llmDescription
In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.
Scores
CVSS v3
9.8
EPSS
0.0033
EPSS Percentile
55.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Classification
CWE
CWE-916
Status
published
Affected Products (20)
digi/realport
< 1.9-40
digi/realport
< 4.10.490
digi/connectport_ts_8\/16_firmware
digi/connectport_lts_8\/16\/32_firmware
digi/passport_integrated_console_server_firmware
digi/cm_firmware
digi/portserver_ts_firmware
digi/portserver_ts_mei_firmware
digi/portserver_ts_mei_hardened_firmware
digi/portserver_ts_m_mei_firmware
digi/6350-sr_firmware
digi/portserver_ts_p_mei_firmware
digi/transport_wr11_xt_firmware
digi/one_ia_firmware
digi/wr31_firmware
... and 5 more
Timeline
Published
Oct 08, 2021
Tracked Since
Feb 18, 2026