CVE-2021-36767

9.8 CRITICAL

📋 TL;DR

CVE-2021-36767 is an authentication bypass vulnerability in Digi RealPort software where the challenge-response mechanism leaks a weakly-hashed server password. Attackers can send unauthenticated requests to obtain this hash, crack it offline, and gain unauthorized access. This affects all Digi RealPort installations through version 4.10.490.

💻 Affected Systems

Products:
  • Digi RealPort
Versions: through 4.10.490
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable as the authentication mechanism itself is flawed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Digi RealPort server allowing attackers to intercept, modify, or block serial communications, potentially disrupting industrial control systems or critical infrastructure.

🟠

Likely Case

Unauthorized access to serial port communications, data exfiltration, or service disruption for connected devices.

🟢

If Mitigated

Limited impact if network segmentation prevents external access and strong authentication controls are in place elsewhere.

🌐 Internet-Facing: HIGH - Internet-facing servers are directly exploitable without authentication.
🏢 Internal Only: HIGH - Internal attackers or compromised internal systems can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only network access to the RealPort server and basic hash cracking tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.10.491 and later

Vendor Advisory: https://www.digi.com/resources/security

Restart Required: Yes

Instructions:

1. Download latest version from Digi support portal. 2. Backup configuration. 3. Install update. 4. Restart RealPort service.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to RealPort servers using firewalls or network ACLs.

Disable Unused Services

windows

Disable RealPort services on systems where they are not required.

sc stop RealPort
sc config RealPort start= disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate RealPort servers from untrusted networks
  • Monitor for unauthorized access attempts and implement multi-factor authentication where possible

🔍 How to Verify

Check if Vulnerable:

Check RealPort version in About dialog or registry: HKEY_LOCAL_MACHINE\SOFTWARE\Digi International\RealPort\Version

Check Version:

reg query "HKLM\SOFTWARE\Digi International\RealPort" /v Version

Verify Fix Applied:

Verify version is 4.10.491 or higher and test authentication with invalid credentials.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful login
  • Multiple connection attempts from single IP

Network Indicators:

  • Unusual traffic patterns to RealPort default port 771
  • Unauthorized access to serial port resources

SIEM Query:

source="RealPort" AND (event_type="authentication" AND result="success") AND src_ip NOT IN allowed_ips

🔗 References

📤 Share & Export