#VU80325 Use of Password Hash Instead of Password for Authentication in Digi International Inc. products - CVE-2023-4299
Published: September 4, 2023
Vulnerability identifier: #VU80325
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2023-4299
CWE-ID: CWE-836
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Digi RealPort for Windows
Digi RealPort for Linux
Digi Passport Console Server
Digi CM Console Server
Digi PortServer TS
Digi PortServer TS MEI
Digi PortServer TS MEI Hardened
Digi PortServer TS M MEI
Digi PortServer TS P MEI
Digi One IAP Family
Digi One IA
Digi One SP IA
Digi One SP
Digi WR31
Digi WR11 XT
Digi WR44 R
Digi WR21
Digi Connect SP
Digi ConnectPort TS 8/16
Digi ConnectPort LTS 8/16/32
Digi Connect ES
Digi RealPort for Windows
Digi RealPort for Linux
Digi Passport Console Server
Digi CM Console Server
Digi PortServer TS
Digi PortServer TS MEI
Digi PortServer TS MEI Hardened
Digi PortServer TS M MEI
Digi PortServer TS P MEI
Digi One IAP Family
Digi One IA
Digi One SP IA
Digi One SP
Digi WR31
Digi WR11 XT
Digi WR44 R
Digi WR21
Digi Connect SP
Digi ConnectPort TS 8/16
Digi ConnectPort LTS 8/16/32
Digi Connect ES
Software vendor:
Digi International Inc.
Digi International Inc.
Description
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to use of password hash instead of password for authentication in Digi RealPort Protocol. A remote attacker can perform a replay attack and bypass authentication to access connected equipment.
Remediation
Install updates from vendor's website.