1 results (0.001 seconds)
CVSS: 9.0EPSS: 0%CPEs: 40EXPL: 0
CVE-2023-4299 – Digi RealPort Protocol Use of Password Hash Instead of Password for Authentication
https://notcve.org/view.php?id=CVE-2023-4299
Digi RealPort Protocol is vulnerable to a replay attack that may allow an attacker to bypass authentication to access connected equipment. El protocolo Digi RealPort es vulnerable a un ataque de repetición que puede permitir a un atacante saltarse la autenticación para acceder a los equipos conectados. • https://www.cisa.gov/news-events/ics-advisories/icsa-23-243-04 https://www.digi.com/getattachment/resources/security/alerts/realport-cves/Dragos-Disclosure-Statement.pdf • CWE-836: Use of Password Hash Instead of Password for Authentication •