First published: Fri Dec 10 2021(Updated: )
An issue was discovered in Digi TransPort DR64, SR44 VC74, and WR. The ZING protocol allows arbitrary remote command execution with SUPER privileges. This allows an attacker (with knowledge of the protocol) to execute arbitrary code on the controller including overwriting firmware, adding/removing users, disabling the internal firewall, etc.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Digi Transport Dr64 Firmware | <=5.2.4.9 | |
Digi TransPort DR64 | ||
Digi Transport Sr44 Firmware | ||
Digi Transport Sr44 | ||
Digi Transport Vc74 Firmware | <=5.2.4.9 | |
Digi Transport Vc74 | ||
Digi Transport Wr11 Firmware | <=8.2.1.3 | |
Digi Transport Wr11 | ||
Digi Transport Wr11 Xt Firmware | <=8.2.1.3 | |
Digi Transport Wr11 Xt | ||
Digi Transport Wr21 Firmware | <=8.2.1.3 | |
Digi TransPort WR21 | ||
Digi Transport Wr31 Firmware | <=8.2.1.3 | |
Digi Transport Wr31 | ||
Digi Transport Wr41 Firmware | >=5.0.0.0<=5.2.4.6 | |
Digi Transport Wr41 Firmware | >=6.0.0.0<=6.1.3.5 | |
Digi Transport Wr41 Firmware | >=8.0.0.0<=8.3.1.2 | |
Digi Transport Wr41 | ||
Digi Transport Wr44 Firmware | <=8.3.1.2 | |
Digi Transport Wr44 | =v2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-35978 is a vulnerability found in Digi TransPort DR64, SR44 VC74, and WR that allows arbitrary remote command execution with SUPER privileges.
CVE-2021-35978 has a severity rating of 9.8 (Critical).
Digi TransPort DR64 Firmware versions up to and including 5.2.4.9, and Digi Transport VC74 Firmware versions up to and including 5.2.4.9 are affected.
An attacker with knowledge of the ZING protocol can exploit CVE-2021-35978 to execute arbitrary code on the controller including overwriting firmware or adding/removing users.
You can find more information about CVE-2021-35978 on the Digi website and in the vulnerability disclosure document available at the provided GitHub link.