SB2023090414 - Use of Password Hash Instead of Password for Authentication in Digi RealPort Protocol 



SB2023090414 - Use of Password Hash Instead of Password for Authentication in Digi RealPort Protocol

Published: September 4, 2023

Security Bulletin ID SB2023090414
Severity
High
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Use of Password Hash Instead of Password for Authentication (CVE-ID: CVE-2023-4299)

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to use of password hash instead of password for authentication in Digi RealPort Protocol. A remote attacker can perform a replay attack and bypass authentication to access connected equipment.


Remediation

Install update from vendor's website.