Vulnerabilities > Digi > Portserver TS M MEI Firmware
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-08-31 | CVE-2023-4299 | Use of Password Hash Instead of Password for Authentication vulnerability in Digi products Digi RealPort Protocol is vulnerable to a replay attack that may allow an attacker to bypass authentication to access connected equipment. | 8.1 |
2021-10-08 | CVE-2021-35977 | Classic Buffer Overflow vulnerability in Digi products An issue was discovered in Digi RealPort for Windows through 4.8.488.0. | 9.8 |
2021-10-08 | CVE-2021-35979 | Missing Authentication for Critical Function vulnerability in Digi products An issue was discovered in Digi RealPort through 4.8.488.0. | 8.1 |
2021-10-08 | CVE-2021-36767 | Use of Password Hash With Insufficient Computational Effort vulnerability in Digi products In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. | 9.8 |