Link | Resource |
---|---|
https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/main/2021-02.txt | Third Party Advisory |
https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/main/2021-02.txt | Third Party Advisory |
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
Configuration 19 (hide)
AND |
|
21 Nov 2024, 06:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/main/2021-02.txt - Third Party Advisory |
26 May 2023, 18:18
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:digi:connectcore_8x_firmware:*:*:*:*:*:*:*:* |
01 Jan 2022, 01:15
Type | Values Removed | Values Added |
---|---|---|
Summary | In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server. |
19 Oct 2021, 13:14
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
CPE | cpe:2.3:o:digi:passport_integrated_console_server_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:digi:connectport_ts_8\/16:-:*:*:*:*:*:*:* cpe:2.3:h:digi:wr44_r:-:*:*:*:*:*:*:* cpe:2.3:o:digi:portserver_ts_mei_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:digi:portserver_ts_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:digi:connectcore_8x_sbc_pro:-:*:*:*:*:*:*:* cpe:2.3:o:digi:portserver_ts_m_mei_firmware:*:*:*:*:*:*:*:* cpe:2.3:a:digi:realport:*:*:*:*:*:linux:*:* cpe:2.3:o:digi:transport_wr11_xt_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:digi:portserver_ts_mei:-:*:*:*:*:*:*:* cpe:2.3:o:digi:connectport_ts_8\/16_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:digi:connectcore_8x:-:*:*:*:*:*:*:* cpe:2.3:h:digi:portserver_ts_m_mei:-:*:*:*:*:*:*:* cpe:2.3:h:digi:cm:-:*:*:*:*:*:*:* cpe:2.3:o:digi:wr21_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:digi:connectport_lts_8\/16\/32_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:digi:connectcore_8x_som_dualxz:-:*:*:*:*:*:*:* cpe:2.3:o:digi:connect_es_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:digi:connectcore_8x_som_quadxplus:-:*:*:*:*:*:*:* cpe:2.3:h:digi:passport_integrated_console_server:-:*:*:*:*:*:*:* cpe:2.3:o:digi:one_iap_haz_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:digi:connectcore_8x_som_quadxplus_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:digi:one_ia:-:*:*:*:*:*:*:* cpe:2.3:h:digi:wr21:-:*:*:*:*:*:*:* cpe:2.3:o:digi:connectcore_8x_sbc_pro_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:digi:connectcore_8x_som_dualxz_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:digi:transport_wr11_xt:-:*:*:*:*:*:*:* cpe:2.3:h:digi:portserver_ts:-:*:*:*:*:*:*:* cpe:2.3:h:digi:connect_es:-:*:*:*:*:*:*:* cpe:2.3:a:digi:realport:*:*:*:*:*:windows:*:* cpe:2.3:h:digi:portserver_ts_mei_hardened:-:*:*:*:*:*:*:* cpe:2.3:h:digi:6350-sr:-:*:*:*:*:*:*:* cpe:2.3:o:digi:wr31_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:digi:connectcore_8x_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:digi:portserver_ts_p_mei_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:digi:wr44_r_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:digi:wr31:-:*:*:*:*:*:*:* cpe:2.3:h:digi:one_iap_haz:-:*:*:*:*:*:*:* cpe:2.3:h:digi:connectport_lts_8\/16\/32:-:*:*:*:*:*:*:* cpe:2.3:o:digi:one_iap_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:digi:cm_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:digi:portserver_ts_mei_hardened_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:digi:one_ia_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:digi:one_iap:-:*:*:*:*:*:*:* cpe:2.3:o:digi:6350-sr_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:digi:portserver_ts_p_mei:-:*:*:*:*:*:*:* |
|
References | (MISC) https://raw.githubusercontent.com/reidmefirst/vuln-disclosure/main/2021-02.txt - Third Party Advisory | |
CWE | CWE-916 |
08 Oct 2021, 15:22
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Published : 2021-10-08 15:15
Updated : 2024-11-21 06:14
NVD link : CVE-2021-36767
Mitre link : CVE-2021-36767
CVE.ORG link : CVE-2021-36767
JSON object : View
digi
- wr21_firmware
- wr44_r_firmware
- one_iap_haz_firmware
- wr21
- connectport_lts_8\/16\/32_firmware
- transport_wr11_xt
- connect_es
- connectport_lts_8\/16\/32
- wr31_firmware
- one_iap
- portserver_ts_mei_hardened_firmware
- passport_integrated_console_server_firmware
- one_ia_firmware
- connect_es_firmware
- portserver_ts_m_mei_firmware
- realport
- portserver_ts_mei_hardened
- passport_integrated_console_server
- portserver_ts_p_mei
- cm_firmware
- wr31
- portserver_ts_firmware
- connectport_ts_8\/16
- transport_wr11_xt_firmware
- portserver_ts_m_mei
- 6350-sr
- one_iap_haz
- connectport_ts_8\/16_firmware
- portserver_ts_mei
- one_iap_firmware
- wr44_r
- 6350-sr_firmware
- portserver_ts_p_mei_firmware
- one_ia
- portserver_ts
- portserver_ts_mei_firmware
- cm
Use of Password Hash With Insufficient Computational Effort