digi CVE Vulnerabilities & Metrics

Focus on digi vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About digi Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with digi. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total digi CVEs: 18
Earliest CVE date: 27 Apr 2004, 04:00 UTC
Latest CVE date: 31 Aug 2023, 21:15 UTC

Latest CVE reference: CVE-2023-4299

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical digi CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.65

Max CVSS: 10.0

Critical CVEs (≥9): 2

CVSS Range vs. Count

Range Count
0.0-3.9 2
4.0-6.9 12
7.0-8.9 3
9.0-10.0 2

CVSS Distribution Chart

Top 5 Highest CVSS digi CVEs

These are the five CVEs with the highest CVSS scores for digi, sorted by severity first and recency.

All CVEs for digi

CVE-2023-4299 digi vulnerability CVSS: 0 31 Aug 2023, 21:15 UTC

Digi RealPort Protocol is vulnerable to a replay attack that may allow an attacker to bypass authentication to access connected equipment.

CVE-2022-26953 digi vulnerability CVSS: 5.0 06 Apr 2022, 01:15 UTC

Digi Passport Firmware through 1.5.1,1 is affected by a buffer overflow. An attacker can supply a string in the page parameter for reboot.asp endpoint, allowing him to force an overflow when the string is concatenated to the HTML body.

CVE-2022-26952 digi vulnerability CVSS: 5.0 06 Apr 2022, 01:15 UTC

Digi Passport Firmware through 1.5.1,1 is affected by a buffer overflow in the function for building the Location header string when an unauthenticated user is redirected to the authentication page.

CVE-2021-37189 digi vulnerability CVSS: 5.0 10 Dec 2021, 13:15 UTC

An issue was discovered on Digi TransPort Gateway devices through 5.2.13.4. They do not set the Secure attribute for sensitive cookies in HTTPS sessions, which could cause the user agent to send those cookies in cleartext over an HTTP session.

CVE-2021-37188 digi vulnerability CVSS: 6.5 10 Dec 2021, 13:15 UTC

An issue was discovered on Digi TransPort devices through 2021-07-21. An authenticated attacker may load customized firmware (because the bootloader does not verify that it is authentic), changing the behavior of the gateway.

CVE-2021-37187 digi vulnerability CVSS: 4.0 10 Dec 2021, 13:15 UTC

An issue was discovered on Digi TransPort devices through 2021-07-21. An authenticated attacker may read a password file (with reversible passwords) from the device, which allows decoding of other users' passwords.

CVE-2021-35978 digi vulnerability CVSS: 10.0 10 Dec 2021, 13:15 UTC

An issue was discovered in Digi TransPort DR64, SR44 VC74, and WR. The ZING protocol allows arbitrary remote command execution with SUPER privileges. This allows an attacker (with knowledge of the protocol) to execute arbitrary code on the controller including overwriting firmware, adding/removing users, disabling the internal firewall, etc.

CVE-2021-36767 digi vulnerability CVSS: 7.5 08 Oct 2021, 15:15 UTC

In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's access password. The attacker may then crack this hash offline in order to successfully login to the server.

CVE-2021-35979 digi vulnerability CVSS: 6.8 08 Oct 2021, 15:15 UTC

An issue was discovered in Digi RealPort through 4.8.488.0. The 'encrypted' mode is vulnerable to man-in-the-middle attacks and does not perform authentication.

CVE-2021-35977 digi vulnerability CVSS: 7.5 08 Oct 2021, 15:15 UTC

An issue was discovered in Digi RealPort for Windows through 4.8.488.0. A buffer overflow exists in the handling of ADDP discovery response messages. This could result in arbitrary code execution.

CVE-2021-38412 digi vulnerability CVSS: 7.5 17 Sep 2021, 20:15 UTC

Properly formatted POST requests to multiple resources on the HTTP and HTTPS web servers of the Digi PortServer TS 16 Rack device do not require authentication or authentication tokens. This vulnerability could allow an attacker to enable the SNMP service and manipulate the community strings to achieve further control in.

CVE-2020-10136 digi vulnerability CVSS: 5.0 02 Jun 2020, 09:15 UTC

IP-in-IP protocol specifies IP Encapsulation within IP standard (RFC 2003, STD 1) that decapsulate and route IP-in-IP traffic is vulnerable to spoofing, access-control bypass and other unexpected behavior due to the lack of validation to verify network packets before decapsulation and routing.

CVE-2017-18868 digi vulnerability CVSS: 5.5 21 May 2020, 20:15 UTC

Digi XBee 2 devices do not have an effective protection mechanism against remote AT commands, because of issues related to the network stack upon which the ZigBee protocol is built.

CVE-2020-6973 digi vulnerability CVSS: 6.3 13 Feb 2020, 00:15 UTC

Digi International ConnectPort LTS 32 MEI, Firmware Version 1.4.3 (82002228_K 08/09/2018), bios Version 1.2. Multiple cross-site scripting vulnerabilities exist that could allow an attacker to cause a denial-of-service condition.

CVE-2020-6975 digi vulnerability CVSS: 4.0 12 Feb 2020, 23:15 UTC

Digi International ConnectPort LTS 32 MEI, Firmware Version 1.4.3 (82002228_K 08/09/2018), bios Version 1.2. Successful exploitation of this vulnerability could allow an attacker to upload a malicious file to the application.

CVE-2020-8822 digi vulnerability CVSS: 3.5 10 Feb 2020, 02:15 UTC

Digi TransPort WR21 5.2.2.3, WR44 5.1.6.4, and WR44v2 5.1.6.9 devices allow stored XSS in the web application.

CVE-2019-18859 digi vulnerability CVSS: 4.3 09 Jan 2020, 21:15 UTC

Digi AnywhereUSB 14 allows XSS via a link for the Digi Page.

CVE-2018-20162 digi vulnerability CVSS: 9.0 21 Mar 2019, 16:00 UTC

Digi TransPort LR54 4.4.0.26 and possible earlier devices have Improper Input Validation that allows users with 'super' CLI access privileges to bypass a restricted shell and execute arbitrary commands as root.

CVE-2004-1973 digi vulnerability CVSS: 5.0 27 Apr 2004, 04:00 UTC

DiGi Web Server allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request that contains a large number of / (slash) characters, which consumes resources when DiGi converts the slashes to \ (backslash) characters.