{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-4299","assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","state":"PUBLISHED","assignerShortName":"icscert","dateReserved":"2023-08-10T20:14:27.489Z","datePublished":"2023-08-31T20:45:43.866Z","dateUpdated":"2025-01-16T21:30:37.810Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Windows"],"product":"Digi RealPort","vendor":"Digi International ","versions":[{"lessThanOrEqual":"4.8.488.0","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["Linux"],"product":"Digi RealPort","vendor":"Digi International ","versions":[{"lessThanOrEqual":"1.9-40","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"Digi ConnectPort TS 8/16","vendor":"Digi International ","versions":[{"lessThan":"2.26.2.4","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"Digi Passport Console Server","vendor":"Digi International ","versions":[{"status":"affected","version":"all versions"}]},{"defaultStatus":"unaffected","product":"Digi ConnectPort LTS 8/16/32","vendor":"Digi International ","versions":[{"lessThan":"1.4.9","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"Digi CM Console Server","vendor":"Digi International ","versions":[{"status":"affected","version":"all versions"}]},{"defaultStatus":"unaffected","product":"Digi PortServer TS","vendor":"Digi International ","versions":[{"status":"affected","version":"all versions"}]},{"defaultStatus":"unaffected","product":"Digi PortServer TS MEI","vendor":"Digi International ","versions":[{"status":"affected","version":"all versions"}]},{"defaultStatus":"unaffected","product":"Digi PortServer TS MEI Hardened","vendor":"Digi International ","versions":[{"status":"affected","version":"all versions"}]},{"defaultStatus":"unaffected","product":"Digi PortServer TS M MEI","vendor":"Digi International ","versions":[{"status":"affected","version":"all versions"}]},{"defaultStatus":"unaffected","product":"Digi PortServer TS P MEI","vendor":"Digi International ","versions":[{"status":"affected","version":"all versions"}]},{"defaultStatus":"unaffected","product":"Digi One IAP Family","vendor":"Digi International ","versions":[{"status":"affected","version":"all versions"}]},{"defaultStatus":"unaffected","product":"Digi One IA","vendor":"Digi International ","versions":[{"status":"affected","version":"all versions"}]},{"defaultStatus":"unaffected","product":"Digi One SP IA","vendor":"Digi International ","versions":[{"status":"affected","version":"all versions"}]},{"defaultStatus":"unaffected","product":"​Digi One SP","vendor":"Digi International ","versions":[{"status":"affected","version":"all versions"}]},{"defaultStatus":"unaffected","product":"Digi WR31","vendor":"Digi International ","versions":[{"status":"affected","version":"all versions"}]},{"defaultStatus":"unaffected","product":"Digi WR11 XT","vendor":"Digi International ","versions":[{"status":"affected","version":"all versions"}]},{"defaultStatus":"unaffected","product":"Digi WR44 R","vendor":"Digi International ","versions":[{"status":"affected","version":"all versions"}]},{"defaultStatus":"unaffected","product":"Digi WR21","vendor":"Digi International ","versions":[{"status":"affected","version":"all versions"}]},{"defaultStatus":"unaffected","product":"Digi Connect ES","vendor":"Digi International ","versions":[{"lessThan":"2.26.2.4","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"Digi Connect SP","vendor":"Digi International ","versions":[{"status":"affected","version":"all versions"}]},{"defaultStatus":"unaffected","product":"Digi 6350-SR","vendor":"Digi International ","versions":[{"status":"unaffected","version":"all versions"}]},{"defaultStatus":"unaffected","product":"Digi ConnectCore 8X products","vendor":"Digi International ","versions":[{"status":"unaffected","version":"all versions"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Reid Wightman of Dragos, Inc reported this vulnerability to Digi International."}],"datePublic":"2023-08-31T20:29:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<span style=\"background-color: rgb(255, 255, 255);\">Digi RealPort Protocol is vulnerable to a replay attack that may allow an attacker to bypass authentication to access connected equipment.</span>\n\n"}],"value":"\nDigi RealPort Protocol is vulnerable to a replay attack that may allow an attacker to bypass authentication to access connected equipment.\n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-836","description":"CWE-836","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2023-08-31T20:45:43.866Z"},"references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-243-04"},{"url":"https://www.digi.com/getattachment/resources/security/alerts/realport-cves/Dragos-Disclosure-Statement.pdf"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<p>Digi International recommends users acquire and install patches that they have made available for the following products:</p><ul><li>​RealPort software for Windows: Fixed in 4.10.490</li><li>​Digi ConnectPort TS 8/16: Fixed in firmware version 2.26.2.4</li><li>​Digi ConnectPort LTS 8/16/32: Fixed in version 1.4.9</li><li>​Digi Connect ES: Fixed in firmware version 2.26.2.4</li></ul><p>​For more information, see the <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.digi.com/getattachment/resources/security/alerts/realport-cves/Dragos-Disclosure-Statement.pdf\">customer notification document</a>&nbsp;published by Digi International.</p>\n\n<br>"}],"value":"\nDigi International recommends users acquire and install patches that they have made available for the following products:\n\n  *  ​RealPort software for Windows: Fixed in 4.10.490\n  *  ​Digi ConnectPort TS 8/16: Fixed in firmware version 2.26.2.4\n  *  ​Digi ConnectPort LTS 8/16/32: Fixed in version 1.4.9\n  *  ​Digi Connect ES: Fixed in firmware version 2.26.2.4\n\n\n​For more information, see the  customer notification document https://www.digi.com/getattachment/resources/security/alerts/realport-cves/Dragos-Disclosure-Statement.pdf  published by Digi International.\n\n\n\n\n"}],"source":{"discovery":"EXTERNAL"},"title":"Digi RealPort Protocol Use of Password Hash Instead of Password for Authentication","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n\n<p>Dragos recommends restricting access to Digi devices on TCP/771 (default) or TCP/1027 (if encryption is enabled, this is the default port). Only allow the workstations which initiate RealPort connections to communicate to the field equipment on those ports. Note that most of Digi's devices allow you to change the setting for which TCP port the RealPort service runs on, so end users should consult their device configuration and restrict access to the configured port if it is not the default.</p><p>​If using the system in 'reverse' mode, where the Digi device calls back to the Windows or Linux workstation, then Dragos recommends restricting access to the workstation on TCP/771 or TCP/1027 to known Digi RealPort devices on your network. This port may be configured by end users, so consult the workstation and device configurations to ensure coverage.</p>\n\n<br>"}],"value":"\nDragos recommends restricting access to Digi devices on TCP/771 (default) or TCP/1027 (if encryption is enabled, this is the default port). Only allow the workstations which initiate RealPort connections to communicate to the field equipment on those ports. Note that most of Digi's devices allow you to change the setting for which TCP port the RealPort service runs on, so end users should consult their device configuration and restrict access to the configured port if it is not the default.\n\n​If using the system in 'reverse' mode, where the Digi device calls back to the Windows or Linux workstation, then Dragos recommends restricting access to the workstation on TCP/771 or TCP/1027 to known Digi RealPort devices on your network. This port may be configured by end users, so consult the workstation and device configurations to ensure coverage.\n\n\n\n\n"}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T07:24:04.616Z"},"title":"CVE Program Container","references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-23-243-04","tags":["x_transferred"]},{"url":"https://www.digi.com/getattachment/resources/security/alerts/realport-cves/Dragos-Disclosure-Statement.pdf","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-16T21:20:30.564576Z","id":"CVE-2023-4299","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-16T21:30:37.810Z"}}]}}