CVE-2021-36767

In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.
Configurations

Configuration 1

cpe:2.3:a:digi:realport:*:*:*:*:*:linux:*:*
cpe:2.3:a:digi:realport:*:*:*:*:*:windows:*:*

Information

Published : 2021-10-08 03:15

Updated : 2022-04-29 12:49


NVD link : CVE-2021-36767

Mitre link : CVE-2021-36767

Products Affected
No products.
CWE