Description
In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.
Related CPE's
a
digi
realport
References
https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/main/2021-02.txt
https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/main/2021-02.txt
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 · Critical
Information
Source identifier
Vulnerability status
Modified
Published
2021-10-08T13:15:09.037Z
4 years agoLast modified
2024-11-21T05:14:03.237Z
1 year ago