Summary
Detail | |||
---|---|---|---|
Vendor | Digi | First view | 2021-12-10 |
Product | Transport dr64 Firmware | Last view | 2021-12-10 |
Version | Type | Os | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:o:digi:transport_dr64_firmware:-:*:*:*:*:*:*:* | 3 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
8.8 | 2021-12-10 | CVE-2021-37188 | An issue was discovered on Digi TransPort devices through 2021-07-21. An authenticated attacker may load customized firmware (because the bootloader does not verify that it is authentic), changing the behavior of the gateway. |
6.5 | 2021-12-10 | CVE-2021-37187 | An issue was discovered on Digi TransPort devices through 2021-07-21. An authenticated attacker may read a password file (with reversible passwords) from the device, which allows decoding of other users' passwords. |
9.8 | 2021-12-10 | CVE-2021-35978 | An issue was discovered in Digi TransPort DR64, SR44 VC74, and WR. The ZING protocol allows arbitrary remote command execution with SUPER privileges. This allows an attacker (with knowledge of the protocol) to execute arbitrary code on the controller including overwriting firmware, adding/removing users, disabling the internal firewall, etc. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
33% (1) | CWE-522 | Insufficiently Protected Credentials |
33% (1) | CWE-345 | Insufficient Verification of Data Authenticity |
33% (1) | CWE-77 | Improper Sanitization of Special Elements used in a Command ('Comma... |