CVE-2021-35978

9.8 CRITICAL

📋 TL;DR

This critical vulnerability in Digi TransPort devices allows remote attackers with knowledge of the ZING protocol to execute arbitrary commands with SUPER privileges. Affected devices include DR64, SR44, VC74, and WR series controllers. Attackers can overwrite firmware, modify users, disable firewalls, and gain complete control of affected systems.

💻 Affected Systems

Products:
  • Digi TransPort DR64
  • Digi TransPort SR44
  • Digi TransPort VC74
  • Digi TransPort WR
Versions: All versions prior to patched firmware
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with ZING protocol enabled are vulnerable. This protocol may be enabled by default in some configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing firmware replacement, permanent backdoor installation, data exfiltration, and use as pivot point into internal networks.

🟠

Likely Case

Unauthorized access leading to configuration changes, user account manipulation, and potential ransomware deployment on industrial control systems.

🟢

If Mitigated

Limited impact if devices are behind strict network segmentation with no internet exposure and ZING protocol disabled.

🌐 Internet-Facing: HIGH - Directly exploitable over network with no authentication required.
🏢 Internal Only: HIGH - Even internally, any network access to affected devices enables complete compromise.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of ZING protocol but no authentication. Public disclosure includes technical details enabling exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Digi firmware updates for specific version

Vendor Advisory: https://digi.com

Restart Required: Yes

Instructions:

1. Check Digi support portal for latest firmware. 2. Backup current configuration. 3. Apply firmware update via web interface or console. 4. Verify ZING protocol is disabled if not needed. 5. Restart device.

🔧 Temporary Workarounds

Disable ZING Protocol

all

Disable the vulnerable ZING protocol if not required for operations

Configuration varies by device - disable via web interface or CLI

Network Segmentation

all

Isolate affected devices from untrusted networks

Implement firewall rules blocking port 2362/tcp (ZING default)

🧯 If You Can't Patch

  • Implement strict network access controls allowing only trusted IPs to communicate with affected devices
  • Monitor network traffic for ZING protocol usage and investigate any unexpected connections

🔍 How to Verify

Check if Vulnerable:

Check if ZING protocol is enabled in device configuration and if firmware version is unpatched

Check Version:

Check via web interface or console: show version

Verify Fix Applied:

Verify firmware version is updated to latest and ZING protocol is disabled

📡 Detection & Monitoring

Log Indicators:

  • Unexpected ZING protocol connections
  • Configuration changes without authorization
  • New user account creation

Network Indicators:

  • Traffic on port 2362/tcp (ZING default)
  • Unusual outbound connections from device

SIEM Query:

source_port:2362 OR protocol:"ZING" OR device_type:"Digi TransPort" AND (event_type:"config_change" OR event_type:"user_added")

🔗 References

📤 Share & Export