Product:

Passport_firmware

(Digi)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 3
Date Id Summary Products Score Patch Annotated
2023-08-31 CVE-2023-4299 Digi RealPort Protocol is vulnerable to a replay attack that may allow an attacker to bypass authentication to access connected equipment. Cm_firmware, Connect_es_firmware, Connect_sp_firmware, Connectport_lts_8\/16\/32_firmware, Connectport_ts_8\/16_firmware, One_ia_firmware, One_iap_firmware, One_sp_firmware, One_sp_ia_firmware, Passport_firmware, Portserver_ts_firmware, Portserver_ts_m_mei_firmware, Portserver_ts_mei_firmware, Portserver_ts_mei_hardened_firmware, Portserver_ts_p_mei_firmware, Realport, Transport_wr11_xt_firmware, Wr21_firmware, Wr31_firmware, Wr44_r_firmware 8.1
2022-04-06 CVE-2022-26952 Digi Passport Firmware through 1.5.1,1 is affected by a buffer overflow in the function for building the Location header string when an unauthenticated user is redirected to the authentication page. Passport_firmware 7.5
2022-04-06 CVE-2022-26953 Digi Passport Firmware through 1.5.1,1 is affected by a buffer overflow. An attacker can supply a string in the page parameter for reboot.asp endpoint, allowing him to force an overflow when the string is concatenated to the HTML body. Passport_firmware 7.5