CVE-2021-36767

In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:digi:realport:*:*:*:*:*:linux:*:*
cpe:2.3:a:digi:realport:*:*:*:*:*:windows:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:digi:connectport_ts_8\/16_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:connectport_ts_8\/16:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:digi:connectport_lts_8\/16\/32_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:connectport_lts_8\/16\/32:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:digi:passport_integrated_console_server_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:passport_integrated_console_server:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:digi:cm_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:cm:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:digi:portserver_ts_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:portserver_ts:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:digi:portserver_ts_mei_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:portserver_ts_mei:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:digi:portserver_ts_mei_hardened_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:portserver_ts_mei_hardened:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:digi:portserver_ts_m_mei_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:portserver_ts_m_mei:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:digi:6350-sr_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:6350-sr:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:digi:portserver_ts_p_mei_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:portserver_ts_p_mei:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:digi:transport_wr11_xt_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:transport_wr11_xt:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:digi:one_ia_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:one_ia:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:digi:wr31_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:wr31:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:digi:wr44_r_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:wr44_r:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:digi:connect_es_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:connect_es:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:digi:wr21_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:wr21:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:digi:one_iap_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:one_iap:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:digi:one_iap_haz_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:one_iap_haz:-:*:*:*:*:*:*:*

History

25 Sep 2023, 02:30

Type Values Removed Values Added
CPE cpe:2.3:o:digi:connectcore_8x_som_dualxz_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:connectcore_8x_som_quadxplus:-:*:*:*:*:*:*:*
cpe:2.3:h:digi:connectcore_8x_som_dualxz:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:connectcore_8x_sbc_pro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:digi:connectcore_8x_som_quadxplus_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:connectcore_8x_sbc_pro:-:*:*:*:*:*:*:*

26 May 2023, 18:18

Type Values Removed Values Added
CPE cpe:2.3:h:digi:connectcore_8x:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:connectcore_8x_firmware:*:*:*:*:*:*:*:*

01 Jan 2022, 01:15

Type Values Removed Values Added
Summary In Digi RealPort through 4.8.488.0, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server. In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.

19 Oct 2021, 13:14

Type Values Removed Values Added
CPE cpe:2.3:o:digi:cm_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:digi:wr44_r_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:digi:wr31_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:digi:portserver_ts_p_mei_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:connectcore_8x_som_quadxplus:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:6350-sr_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:digi:connectport_ts_8\/16_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:digi:wr21_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:wr31:-:*:*:*:*:*:*:*
cpe:2.3:h:digi:one_iap:-:*:*:*:*:*:*:*
cpe:2.3:h:digi:one_iap_haz:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:connectcore_8x_som_dualxz_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:portserver_ts_mei_hardened:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:one_iap_haz_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:digi:portserver_ts_mei_hardened_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:digi:connectcore_8x_som_quadxplus_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:digi:portserver_ts_mei_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:portserver_ts_mei:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:portserver_ts_m_mei_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:transport_wr11_xt:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:passport_integrated_console_server_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:portserver_ts:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:one_iap_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:connectcore_8x:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:connectport_lts_8\/16\/32_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:connectport_lts_8\/16\/32:-:*:*:*:*:*:*:*
cpe:2.3:h:digi:portserver_ts_p_mei:-:*:*:*:*:*:*:*
cpe:2.3:h:digi:connect_es:-:*:*:*:*:*:*:*
cpe:2.3:h:digi:wr21:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:connectcore_8x_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:passport_integrated_console_server:-:*:*:*:*:*:*:*
cpe:2.3:h:digi:connectcore_8x_sbc_pro:-:*:*:*:*:*:*:*
cpe:2.3:h:digi:connectcore_8x_som_dualxz:-:*:*:*:*:*:*:*
cpe:2.3:a:digi:realport:*:*:*:*:*:windows:*:*
cpe:2.3:o:digi:portserver_ts_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:wr44_r:-:*:*:*:*:*:*:*
cpe:2.3:a:digi:realport:*:*:*:*:*:linux:*:*
cpe:2.3:h:digi:6350-sr:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:connect_es_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:portserver_ts_m_mei:-:*:*:*:*:*:*:*
cpe:2.3:h:digi:connectport_ts_8\/16:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:one_ia_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:digi:transport_wr11_xt_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:one_ia:-:*:*:*:*:*:*:*
cpe:2.3:o:digi:connectcore_8x_sbc_pro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:digi:cm:-:*:*:*:*:*:*:*
References (MISC) https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/main/2021-02.txt - (MISC) https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/main/2021-02.txt - Third Party Advisory
CWE CWE-916
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8

08 Oct 2021, 15:22

Type Values Removed Values Added
New CVE

Information

Published : 2021-10-08 15:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-36767

Mitre link : CVE-2021-36767

CVE.ORG link : CVE-2021-36767


JSON object : View

Products Affected

digi

  • connect_es
  • wr44_r
  • portserver_ts_mei_hardened
  • connectport_ts_8\/16
  • portserver_ts_p_mei_firmware
  • 6350-sr
  • cm
  • portserver_ts_m_mei_firmware
  • realport
  • portserver_ts_mei_firmware
  • one_iap
  • portserver_ts_p_mei
  • portserver_ts_firmware
  • portserver_ts_m_mei
  • connectport_ts_8\/16_firmware
  • passport_integrated_console_server_firmware
  • one_iap_haz_firmware
  • portserver_ts_mei_hardened_firmware
  • one_ia
  • portserver_ts_mei
  • wr31
  • passport_integrated_console_server
  • cm_firmware
  • 6350-sr_firmware
  • transport_wr11_xt
  • one_iap_firmware
  • connect_es_firmware
  • wr44_r_firmware
  • portserver_ts
  • one_ia_firmware
  • one_iap_haz
  • wr21
  • transport_wr11_xt_firmware
  • connectport_lts_8\/16\/32
  • connectport_lts_8\/16\/32_firmware
  • wr21_firmware
  • wr31_firmware
CWE
CWE-916

Use of Password Hash With Insufficient Computational Effort