First published: Fri Dec 10 2021(Updated: )
An issue was discovered in Digi TransPort DR64, SR44 VC74, and WR. The ZING protocol allows arbitrary remote command execution with SUPER privileges. This allows an attacker (with knowledge of the protocol) to execute arbitrary code on the controller including overwriting firmware, adding/removing users, disabling the internal firewall, etc.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Digi Transport | <=5.2.4.9 | |
Digi Transport Dr64 Firmware | ||
Digi Transport | ||
Digi Transport | ||
Digi Transport | <=5.2.4.9 | |
Digi Transport | ||
Digi Transport WR11 Firmware | <=8.2.1.3 | |
Digi Transport | ||
Digi Transport Wr11 Firmware | <=8.2.1.3 | |
Digi Transport | ||
Digi WR21 | <=8.2.1.3 | |
Digi WR21 | ||
Digi WR31 Firmware | <=8.2.1.3 | |
Digi Transport | ||
Digi Transport | >=5.0.0.0<=5.2.4.6 | |
Digi Transport | >=6.0.0.0<=6.1.3.5 | |
Digi Transport | >=8.0.0.0<=8.3.1.2 | |
Digi Transport | ||
Digi WR44 R | <=8.3.1.2 | |
Digi Transport | =v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-35978 is a vulnerability found in Digi TransPort DR64, SR44 VC74, and WR that allows arbitrary remote command execution with SUPER privileges.
CVE-2021-35978 has a severity rating of 9.8 (Critical).
Digi TransPort DR64 Firmware versions up to and including 5.2.4.9, and Digi Transport VC74 Firmware versions up to and including 5.2.4.9 are affected.
An attacker with knowledge of the ZING protocol can exploit CVE-2021-35978 to execute arbitrary code on the controller including overwriting firmware or adding/removing users.
You can find more information about CVE-2021-35978 on the Digi website and in the vulnerability disclosure document available at the provided GitHub link.