<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<atom:link href="https://de.digi.com/resources/security-rss" rel="self" type="application/rss+xml"/>
<title>
<![CDATA[ Digi Security Center - Alerts and Notifications ]]>
</title>
<link>
<![CDATA[ https://www.digi.com/resources/security-rss ]]>
</link>
<description>
<![CDATA[ Welcome to the RSS feed for Digi’s Security Center, where we will strive to make this your one stop location for all the security news, information and resources related to our products and services. ]]>
</description>
<language>
<![CDATA[ en-US ]]>
</language>
<item>
<title>
   <![CDATA[Alert - Security Advisory: CVE-2026-32746 (March 24th 2026)]]>
</title>
<description>
   <![CDATA[<p>On March 12, 2026, a critical vulnerability affecting GNU Inetutils telnetd was publicly disclosed (CVE-2026-32746). The issue has been reported as a pre-authentication remote code execution vulnerability with a CVSS severity score of 9.8. For more information, please see the attached security advisory.</p>
]]>
</description>
<link>
<![CDATA[/getattachment/Resources/Security/Alerts/Security-Advisory-CVE-2026-32746-March-24th-2026/Security-Advisory-CVE-2026-32746-March-2026.pdf]]>
</link>  
<pubDate>Tue, 24 Mar 2026 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=3cf75684-49e9-4b97-abe9-80f82473034c</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Security Advisory Update: React Server Components Vulnerability (December 11 2025)]]>
</title>
<description>
   <![CDATA[<p>Update to our Security Advisory that was <a href="https://www.digi.com/getattachment/Resources/Security/Alerts/Next-js-Vulnerability-December-2025/Security-Advisory-React-Server-Components-Next-js-Vulnerability-December-2025.pdf?v=2">posted</a> on December 9, 2025. On December 11, 2025, three new vulnerabilities were disclosed involving React Server Components (CVE-2025-55184, CVE-2025-67779, and CVE-2025-55183). The issue has been classified as a <strong>Denial of Service</strong> and <strong>Source Code Exposure</strong>, respectively.</p>

<p>Digi International confirmed potential impact across our product and service portfolio (confirmed as low) and immediately patched affected systems. Our internal security processes remain fully engaged, and our teams have verified all components that rely on React. Because we maintain regular update and patch cycles across our systems, our exposure to this vulnerability is minimal.</p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Thu, 11 Dec 2025 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=e455b9fb-cc8e-4722-9482-570266878317</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Security Advisory: React Server Components / Next.js Vulnerability (December 2025)]]>
</title>
<description>
   <![CDATA[<p>On December 3, 2025, a critical industry-wide vulnerability was disclosed involving React Server Components (RSC) and certain versions of Next.js (CVE-2025-55182 / CVE-2025-66478). The issue has been classified as a <strong data-renderer-mark="true">Remote Code Execution (RCE)</strong> vulnerability with the highest severity rating (CVSS 10.0). This vulnerability exists in the underlying open-source components used across many modern web frameworks.</p>

<p>Digi International confirmed potential impact across our product and service portfolio (confirmed as low), and immediately patched affected systems. Our internal security processes remain fully engaged, and our teams have verified all components that rely on React or Next.js. Because we maintain regular update and patch cycles across our systems, our exposure to this vulnerability is minimal.</p>
]]>
</description>
<link>
<![CDATA[/getattachment/Resources/Security/Alerts/Next-js-Vulnerability-December-2025/Security-Advisory-React-Server-Components-Next-js-Vulnerability-December-2025.pdf?v=2]]>
</link>  
<pubDate>Tue, 09 Dec 2025 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=e0bef898-8f82-49a7-9eb0-b6c8cbde30ac</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Improper authentication handling for Digi PortServer TS; Digi One SP, SP IA, IA;  Digi One IAP]]>
</title>
<description>
   <![CDATA[<p>Digi International has identified a security vulnerability affecting all versions of these products running firmware with release dates prior to 2025:</p>

<ul>
	<li>PortServer TS</li>
	<li>Digi One SP/Digi One SP IA/Digi One IA</li>
	<li>Digi One IAP</li>
</ul>

<p>We are committed to the security and integrity of our products and the safety of our customers. Upon discovery of this issue, ourengineering team initiated a full investigation and has developed a fix to address the vulnerability.</p>
]]>
</description>
<link>
<![CDATA[/getattachment/Resources/Security/Alerts/Improper-authentication-handling-for-Digi-PortServ/improper-authentication-handling.pdf]]>
</link>  
<pubDate>Mon, 12 May 2025 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=918d29c2-21dd-4e9b-b490-9198ee713196</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Security fix has been released for ConnectPort LTS]]>
</title>
<description>
   <![CDATA[<p>A set of security fixes for improving how requests are handled in the web interface for the Digi ConnectPort LTS has been published and is ready for download at the following link: &quot;<a href="https://hub.digi.com/support/products/infrastructure-management/digi-connectport-lts-8-16-32-terminal-server/?path=/support/asset/connectport-lts-eos-firmware">https://hub.digi.com/support/products/infrastructure-management/digi-connectport-lts-8-16-32-terminal-server/?path=/support/asset/connectport-lts-eos-firmware</a>&quot;.</p>

<p>Customers who cannot update firmware should disable the ConnectPort LTS unit web page until they are able to schedule an update.</p>

<p>The commands for disabling and re-enabling the web service from the command line as follows:</p>

<p><code>#&gt; set service ra=10,11 state=off</code></p>

<p>to re-enable the web service:</p>

<p><code>#&gt; set service ra=10,11 state=on</code></p>
]]>
</description>
<link>
<![CDATA[ /getattachment/Resources/Security/Alerts/Digi-ConnectPort-LTS-Firmware-Update/ConnectPort-LTS-KB.pdf]]>
</link>  
<pubDate>Thu, 31 Oct 2024 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=9ef0a48b-ec92-47af-8868-2493f9ea95ed</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Security fix has been released for WR11, WR21, WR31, WR44R, WR44RR]]>
</title>
<description>
   <![CDATA[<p>A security fix has been released for WR11, WR21, WR31, WR44R, WR44RR Version 8.6.0.4 to patch the SSH entity to initialize an uninitialized variable, preventing the completion of an unauthenticated SSH sessions from starting after the first SSH session was established. Please download the latest firmware from our <a href="https://www.digi.com/support">support site</a> or via <a href="https://www.digi.com/products/iot-software-services/digi-remote-manager">Digi Remote Manager</a></p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Mon, 08 Jul 2024 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=29b433f2-9afc-4282-9293-7682240a61de</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Terrapin Attack - SSH Vulnerability]]>
</title>
<description>
   <![CDATA[<p>Dear valued customers, we want to inform you about a recently discovered Common Vulnerabilities and Exposures (CVE) affecting some of our devices. For more information and recommended actions, please visit the <a href="https://www.digi.com/getattachment/resources/security/alerts/terrapin/terrapin.pdf">following link</a>. We appreciate your attention to this matter and thank you for your continued trust in our services.</p>
]]>
</description>
<link>
<![CDATA[/getattachment/resources/security/alerts/terrapin/terrapin.pdf]]>
</link>  
<pubDate>Thu, 07 Mar 2024 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=0b70766d-43aa-4138-be76-57b4fa9ecaec</guid>
</item>
<item>
<title>
   <![CDATA[Alert - RealPort CVEs]]>
</title>
<description>
   <![CDATA[<p>The <a href="https://www.digi.com/getattachment/resources/security/alerts/realport-cves/Dragos-Disclosure-Statement.pdf?v=2">attached document</a> includes vulnerability findings from a report that Dragos submitted. These are CVEs that Dragos reported to us, Digi International. Included is a table of Digi International products that were reported as vulnerable by Dragos.</p>
]]>
</description>
<link>
<![CDATA[/getattachment/resources/security/alerts/realport-cves/Dragos-Disclosure-Statement.pdf?v=2]]>
</link>  
<pubDate>Fri, 25 Aug 2023 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=4df69e44-3a38-4d2a-8100-be4fcb457bbb</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Ripple20 Public Disclosure]]>
</title>
<description>
   <![CDATA[<p>Digi International has recently become aware that CVE-2020-11901 is still impacting our NDS and NET+OS product lines, which were part of Ripple20 vulnerabilities. Digi has found that it is appropriate to patch the vulnerability. Please see our <a href="https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st">knowledge-based article</a> for the patch releases related to this vulnerability.</p>

<p>Our development team has already developed a patch for this vulnerability and we strongly recommend that you apply the update as soon as possible to ensure the security of your device.</p>

<p>We take the security of our products very seriously and apologize for any inconvenience this may cause. If you have any questions or concerns, please do not hesitate to contact our support team.</p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st]]>
</link>  
<pubDate>Thu, 20 Jul 2023 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=3755d4ee-ffa9-4db9-8beb-47ab8280d9ed</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Following up with Digi's previous announcement of WiFi Frag Attack.]]>
</title>
<description>
   <![CDATA[<p>Here is the link to our knowledge-based article that goes into detail on WiFi Frag Attack<br />
<a href="https://www.digi.com/support/knowledge-base/frag-attack-security-information">Frag Attack Security Information</a></p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Mon, 05 Dec 2022 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=cd1e4174-4b9c-4c3c-8a62-74cc85f47f24</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Security Update for OpenSSL Critical CVE’s: CVE-2022-3786 and CVE-2022-3602]]>
</title>
<description>
   <![CDATA[<p>Digi International is looking into the new Critical OpenSSL <span><span data-testid="comment-base-item-755761">vulnerabilities</span></span>, CVE-2022-3786, and CVE-2022-3602.</p>

<p>Currently, the EX50 and TX64 devices are vulnerable to CVE-2022-3786 and CVE-2022-3602. All other Digi Accelerated Linux (DAL) products are not affected. The EX50 and TX64 firmware will be updated to mitigate these vulnerabilities within the next patch release.</p>

<p>Digi Embedded Yocto version 4.0-r1 is currently vulnerable to CVE-2022-3786 and CVE-2022-3602 and will be updated to mitigate those vulnerabilities within the next patch release. All other versions of DEY are not affected.</p>

<p>Other OpenSSL libraries are also being looked at as well. The libraries found not up to date will also receive patches.</p>

<p><span><span data-testid="comment-base-item-755761">Any further questions&hellip;&hellip; we will address to further alleviate those concerns</span></span></p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Wed, 09 Nov 2022 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=65708e09-8f4a-47ef-aa57-234c3664baa2</guid>
</item>
<item>
<title>
   <![CDATA[Alert - In regards to California SB-327 and CISA advisory 22-216-01 with respect to the Digi Connect Port X devices manufactured prior to 1-1-2020]]>
</title>
<description>
   <![CDATA[<p>Digi International recommends that using the Connect Port X devices manufactured before 1-1-2020 to change the default password for the root user to a custom value on the device.</p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Thu, 11 Aug 2022 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=5966e570-f5f1-4ebd-b8e4-378acd54de75</guid>
</item>
<item>
<title>
   <![CDATA[Alert - The Digi Security Vulnerability submission process has changed]]>
</title>
<description>
   <![CDATA[<p>You can submit vulnerabilities in the top right-hand corner by filling out Bugcrowd&rsquo;s form. We encourage the researchers or customers to provide an email to better directly communicate with you. Please re-submit any vulnerability that in the last 90 days was sent to <a href="mailto:security@digi.com" title="mailto:security@digi.com">security@digi.com</a> and we did not respond to you. We appreciate your continued service to make Digi International Inc. products stay secure.</p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Fri, 08 Jul 2022 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=12bb9fc6-e0bb-49c0-8d36-6525340ab358</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Software validation hashes are now part of release notes]]>
</title>
<description>
   <![CDATA[<p><a href="https://hub.digi.com/support/products">Visit the Digi support site and find your product</a></p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Fri, 24 Jun 2022 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=931e6fd7-a408-4135-a099-0825facc3bb4</guid>
</item>
<item>
<title>
   <![CDATA[Alert - CVE-2022-22963 and CVE-2022-22965 Do Not Impact Digi Branded Products]]>
</title>
<description>
   <![CDATA[<p>After further due diligence Digi branded products are not vulnerable to either CVE-2022-22963 nor CVE-2022-22965 (Spring4Shell).</p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Tue, 19 Apr 2022 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=12ea7257-93f6-46c2-b0c3-d42165b82c21</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Digi Passport Firmware Update]]>
</title>
<description>
   <![CDATA[<p>A security fix for improving how requests are handled in the web interface has been published and is ready for download at the following link: <a href="https://hub.digi.com/support/products/infrastructure-management/digi-passport/?path=/support/asset/-digi-passport-1.5.2-firmware/">https://hub.digi.com/support/products/infrastructure-management/digi-passport/?path=/support/asset/-digi-passport-1.5.2-firmware/</a></p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Fri, 08 Apr 2022 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=05e1142f-9f56-4ec8-ba2e-4fe7d75e6568</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Spring4Shell Vulnerability (CVE-2022-22963)]]>
</title>
<description>
   <![CDATA[<p>Digi is currently investigating the impact throughout our product lines. Updates will be posted here.</p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Thu, 31 Mar 2022 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=97d2175a-2d94-4a71-9557-e464dda438ff</guid>
</item>
<item>
<title>
   <![CDATA[Alert - OpenSSL infinite loop in BN_mod_sqrt() (CVE-2022-0778)]]>
</title>
<description>
   <![CDATA[<p>Digi is currently investigating the impact throughout our product lines. Updates will be posted here.</p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Tue, 29 Mar 2022 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=cb8ac49e-3b36-4419-8e3c-acdbb9524004</guid>
</item>
<item>
<title>
   <![CDATA[Alert - We have identified that the following four of our products have vulnerable versions related to log4j vulnerabilities CVE-2021-44228, and CVE-2021-45046]]>
</title>
<description>
   <![CDATA[<p>Note that these products are <em>not</em> vulnerable to the latest log4j vulnerability cited on CVE-2021-45105, and the latest installers below bring log4j up to 2.16. We have provided the direct links that patch the mentioned CVE&#39;s next to each product below.</p>

<p>Smart IOmux: <a href="https://hub.digi.com/support/products/system-on-modules/digi-connectcore-6ul/?path=/support/asset/digi-connectcore-smart-iomux-installer/">Smart IOmux</a></p>

<p>Digi XCTU: <a href="https://hub.digi.com/support/products/xctu/">XCTU</a></p>

<p>Digi XBee Multi Programmer: <a href="https://hub.digi.com/support/products/xbee-multi-programmer/?path=/support/asset/digi-xbee-multi-programmer-windows-x86/">XBee Multi Programmer</a></p>

<p>Digi XBee Network Assistant: <a href="https://hub.digi.com/support/products/digi-xbee-network-assistant/?path=/support/asset/xbee-network-assistant-windows-x86/">Digi XBee Network Assistant</a></p>

<p><em>We believe these vulnerabilities did not impose direct exploitation in our products because they are desktop applications run by individual users, and they are not accessible through the Internet or used through web services. The four products above are all of the affected products that we know of at this time. In the event we discover any further issues, we will update this page. For more information related to unaffected products, please review the post below dated December 14, 2021.</em></p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Thu, 23 Dec 2021 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=41b2dbfb-9f0a-4ecb-8036-f2ec8d7ab97d</guid>
</item>
<item>
<title>
   <![CDATA[Alert - After a detailed investigation, Digi has determined Apache Log4j CVE-2021-44228 does not impact many of our products/product families. The unaffected products are listed below.]]>
</title>
<description>
   <![CDATA[<p>If you do not find a product, please note that we are continuing internal testing and will update the list below as soon as the results are known.</p>

<p>Devices not impacted by Apache Log4j CVE-2021:</p>

<ul>
	<li>CTEK G6200 family</li>
	<li>CTEK SkyCloud</li>
	<li>CTEK Z45 family</li>
	<li>Digi 54xx family</li>
	<li>Digi 63xx family</li>
	<li>Digi AnywhereUSB (G2) family</li>
	<li>Digi AnywhereUSB Plus family</li>
	<li>Digi Connect family</li>
	<li>Digi Connect EZ family</li>
	<li>Digi Connect IT family</li>
	<li>Digi ConnectPort family</li>
	<li>Digi ConnectPort LTS family</li>
	<li>Digi Connect Sensor family</li>
	<li>Digi Connect WS family</li>
	<li>Digi Embedded Android</li>
	<li>Digi Embedded Yocto</li>
	<li>Digi EX routers</li>
	<li>Digi IX routers</li>
	<li>Digi LR54</li>
	<li>Digi One family</li>
	<li>Digi Passport family</li>
	<li>Digi PortServer TS family</li>
	<li>Digi Rabbit Embedded Family</li>
	<li>Digi TX routers</li>
	<li>Digi WR11</li>
	<li>Digi WR21</li>
	<li>Digi WR31</li>
	<li>Digi WR44R/RR</li>
	<li>Digi WR54</li>
	<li>Digi WR64</li>
</ul>

<p>Software/Management Platforms:</p>

<ul>
	<li>AnywhereUSB Manager</li>
	<li>Aview</li>
	<li>ARMT</li>
	<li>AVWOB</li>
	<li>Digi Navigator</li>
	<li>Digi Remote Manager</li>
	<li>Digi Xbee mobile app</li>
	<li>Dynamic C</li>
	<li>Lighthouse</li>
	<li>Realport</li>
	<li>Remote Hub Config Utility</li>
</ul>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Tue, 14 Dec 2021 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=ecdf3b3b-2f4d-418a-8718-8f4ac1f6ece8</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Apache Log4j CVE-2021-44228 vulnerability]]>
</title>
<description>
   <![CDATA[<p>Digi is currently investigating the impact throughout our product line. We currently have not discovered any impact at this time. We will continue to work diligently, and update as soon as we come to a conclusion across the organization.</p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Mon, 13 Dec 2021 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=a1b39d63-23a8-4b65-ab95-56682727764c</guid>
</item>
<item>
<title>
   <![CDATA[Alert - FragAttacks - WiFi Fregmentation and Aggregation Attacks]]>
</title>
<description>
   <![CDATA[<p>At this time, Digi is still reviewing these attacks and how they impact our devices. From the nature of the attacks, we do expect that Digi devices will be impacted.</p>

<p>However, it is critical to note that even with these attacks, it has always been DIgi&#39;s policy and suggestions that network communication should never rely on the protections and standards of the data layers (WiFi/BlueTooth). Many of these are implemented in HW and can be difficult to change. If good network practices are used, (TLS/Certificates etc), then these vulnerabilities do not lead to any real impact. These vulnerabilites can only become impactful IF other flaws or issues are present.</p>

<p>It is Digi&#39;s intent to address these issues so that we preserve our defense in depth strategy to security in our products. Due to the complexity of these issues, we believe we will be able to address these by Q4 of 2021 or sooner if possible.</p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Mon, 14 Jun 2021 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=0ef3cd51-76b8-4f53-bd20-89ac2bd3c9a2</guid>
</item>
<item>
<title>
   <![CDATA[Alert - AMNESIA:33 - VU#815128 - Multiple TCP/IP stacks used in Internet of Things (IoT have several vulnerabilities stemming from improper memory management.]]>
</title>
<description>
   <![CDATA[<p>Digi International has never manufactured any products that could be impacted by the AMNESIA:33 vulnerabilities. There is no action required by any of our customers.</p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Wed, 09 Dec 2020 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=9000d548-1c5a-495b-88a2-f459780645fb</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Digi International released software validation hashes]]>
</title>
<description>
   <![CDATA[<p>This document will provide file cryptographic hashes to validate that the software received is the software that Digi has officially provided. These Human validation methods are required for CIP-010-3 R1 Part 1.6 and for other good security practices prior to rolling out critical software or firmware for the enterprise.<br />
<a class="alllinkexternal" href="https://dcrmsupport.s3-us-west-2.amazonaws.com/hashes/Digi-International-Hashes.pdf">Download</a></p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Wed, 30 Sep 2020 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=e84d4e81-4530-4f06-b7fd-8e3ab33eb70d</guid>
</item>
<item>
<title>
   <![CDATA[Alert - RIPPLE20 - Multiple vulnerabilities in TRECK TCP/IP embedded software - VU#257161]]>
</title>
<description>
   <![CDATA[<p>A number of high level vulnerabilities (CVE&#39;s) that affect the TCP/IP internal stack processing have been identified. Digi has been working with customers since February to install firmware updates to address the issue. Under specific circumstances, it may be possible that these vulnerabilities could lead to a remote code execution via a network based attack without authentication.<br />
<br />
CVSSv3.1 Score of 8.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H<br />
<br />
Several Digi products have been identified as impacted, and we strongly recommend that you update your firmware immediately.<br />
<br />
These products include:</p>

<ul>
	<li>Digi Connect&reg; ME, Digi Connect&reg; EM, Digi Connect&reg; WME, Digi Connect&reg; SP, and Digi Connect&reg; ES; Digi Connect&reg; 9C, Digi Connect&reg; 9P;</li>
	<li>Digi ConnectPort&reg; TS, Digi ConnectPort&reg; X2, Digi ConnectPort&reg; X4;</li>
	<li>Digi AnywhereUSB&reg; (First and Second Gen, NOT Plus);</li>
	<li>NetSilicon 7250, 9210, 9215, 9360, 9750;</li>
	<li>Any products using the NET+OS 7.X development environments.</li>
</ul>

<p>For more information, read the <a href="https://www.digi.com/support/knowledge-base/digi-international-security-notice-treck-tcp-ip-st">Digi Knowledge base article</a>.</p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Tue, 16 Jun 2020 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=f253f50a-892e-487c-94df-877d2b7f4e24</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Reflection attack WR11,WR21,WR31,WR41,WR44 series routers - VU#636397 - CVE-2020-10136]]>
</title>
<description>
   <![CDATA[<p>A high level vulnerability (CVSS =&gt; 7.0) was discovered on the Digi WR11,WR21,WR31,WR41, and WR44 cellular routers. The attack allows IP-in-IP encapsulation to be used to route arbitrary network traffic through a vulnerable device.</p>

<p>Please download firmware V8.1.0.1 (or greater) for a fix for this issue. Alternatively, enabling the firewall feature on the devices WAN interface (or cellular interface) port will also mitigate this attack.</p>

<p>For more information on this vulnerability, please see the knowledge base article within the Digi support section</p>
]]>
</description>
<link>
<![CDATA[https://kb.cert.org/vuls/id/636397]]>
</link>  
<pubDate>Tue, 02 Jun 2020 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=2a95b40a-f37b-4d5f-b5e4-6377a2661b27</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Randomization of Secure Session SRP ephemeral values]]>
</title>
<description>
   <![CDATA[<p>A vulnerability was discovered on Digi XBee 3 Zigbee and Digi XBee 3 802.15.4 firmwares where the ephemeral values used for Secure Session SRP authentication are not randomized unless BLE is enabled. This feature is typically used to secure networks against unauthorized remote configuration.</p>

<p>For more information, go to: <a class="external-link" href="https://www.digi.com/support/knowledge-base/xbee-3-%E2%80%93-secure-session-srp-randomization" rel="nofollow noopener" target="_blank" title="Follow link">https://www.digi.com/support/knowledge-base/xbee-3-%E2%80%93-secure-session-srp-randomization</a></p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Mon, 16 Mar 2020 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=1406aba7-d857-4d83-873d-1a696bb7ecf4</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Zigbee transport keys sent 'in the clear']]>
</title>
<description>
   <![CDATA[<p>A vulnerability was discovered on earlier generation XBee ZigBee modules (S2B, S2C, and S2D) where a router that was previously associated with the network can be allowed back onto the secured network using an invalid preconfigured link key. After which, this node could inadvertently pass the network key &quot;in the clear&quot; to devices attempting to join through it.</p>

<p>For more information, go to: <a href="https://www.digi.com/support/knowledge-base/xbee-zigbee-keys-can-be-sent-in-the-clear" rel="nofollow noopener" target="_blank" title="Follow link">https://www.digi.com/support/knowledge-base/xbee-zigbee-keys-can-be-sent-in-the-clear</a></p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Thu, 05 Mar 2020 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=169209c4-343c-48c3-81a9-3cbf39ecf76d</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Digi ConnectPort LTS vulnerabilities - 1 unrestricted upload, and 3 stored cross site scripting vulnerabilities - ICS Advisory (ICSA-20-042-13)]]>
</title>
<description>
   <![CDATA[<p>Vulnerability researchers Murat Aydemir, and Fatih Kayran discovered the above vulnerabilities within the ConnectPort LTS web interface of&nbsp; the Digi ConnectPort LTS firmware. The suggested fix for these issues include an update of firmware to the latest release for your product. For the full US-CERT guidance, please see:&nbsp;<a class="external-link" href="https://www.us-cert.gov/ics/advisories/icsa-20-042-13" rel="nofollow noopener" target="_blank">https://www.us-cert.gov/ics/advisories/icsa-20-042-13</a></p>

<p>For firmware updates, go to:&nbsp;<a class="external-link" href="https://www.digi.com/support/supporttype?type=firmware" rel="nofollow noopener" target="_blank">https://www.digi.com/support/supporttype?type=firmware</a></p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Tue, 11 Feb 2020 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=02a5c256-2bdc-4703-b900-0c0dee44382a</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Followup SACK vulnerability knowledge base article]]>
</title>
<description>
   <![CDATA[<p>For a more detailed list of Digi devices impacted by the SACK vulnerability, see the following KB article, <a href="https://www.digi.com/support/knowledge-base/sack_vulnerability">https://www.digi.com/support/knowledge-base/sack_vulnerability</a></p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/support/knowledge-base/sack_vulnerability]]>
</link>  
<pubDate>Fri, 19 Jul 2019 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=2cad3ea1-d34e-47d9-822f-5982197593ed</guid>
</item>
<item>
<title>
   <![CDATA[Alert - "SACK" Vulnerability - (CVE-2019-11477, CVE-2019-11478, CVE-2019-5599 and CVE-2019-11479)]]>
</title>
<description>
   <![CDATA[<p>Digi Intl. is aware of four recent vulnerabilities known as the &quot;SACK&quot; vulnerabilites.&nbsp;We are currently reviewing impact and coordinating fixes within our known impacted products at this time. More information will be available next week on the timeline for fixes. It is critical to note that these vulnerabilities do NOT impact the confidentiality and Integrity of any Digi devices. All of these vulnerabilities are classified as &quot;Denial of Service&quot; issues. This means that it may be possible to kick a device off the network or reboot the device.</p>
]]>
</description>
<link>
<![CDATA[https://www.kb.cert.org/vuls/id/905115/]]>
</link>  
<pubDate>Tue, 25 Jun 2019 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=0c1a48a0-6a36-4d54-88d1-e35e7ff03213</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Digi LR54/WR64/WR54 CVE-2018-20162 Major Security Vulnerability – Restricted Shell escape]]>
</title>
<description>
   <![CDATA[<p>A vulnerability was discovered by Stig Palmquist in the above named routers. This vulnerability allows an individual with existing full-admin, command-line access, the ability to get a root shell on the device. This vulnerability is not remotely exploitable. We suggest customers upgrade to versions equal to or greater than 4.5.1. It is also noted that even with this vulnerability, many critical parts of the router are read-only, and installed code is protected by a secure boot process. More detail will be published in Digi&rsquo;s Knowledge base on this issue.</p>
]]>
</description>
<link>
<![CDATA[https://blog.hackeriet.no/cve-2018-20162-digi-lr54-restricted-shell-escape/]]>
</link>  
<pubDate>Tue, 19 Feb 2019 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=b6bd4214-8d32-4192-a69e-bfcf129192a7</guid>
</item>
<item>
<title>
   <![CDATA[Alert - libSSH Critical vulnerability : CVE-2018-10933]]>
</title>
<description>
   <![CDATA[<p>Digi is aware of a critical vulnerability in the libssh libraries. We have conducted an impact analysis to identify if any Digi products are affected. We believe at this time that NO Digi products are impacted by this vulnerability, as we do not use this library for features in our products. We will continue to monitor this situation, and will post more information if the status changes.</p>
]]>
</description>
<link>
<![CDATA[https://www.libssh.org/2018/10/16/libssh-0-8-4-and-0-7-6-security-and-bugfix-release]]>
</link>  
<pubDate>Wed, 24 Oct 2018 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=3b828d53-730e-470a-95bc-0019470a0323</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Spectre and Meltdown Vulnerabilities - (CVE-2017-5715, CVE-2017-5753, and CVE-2017-5754)]]>
</title>
<description>
   <![CDATA[<p>Digi is aware of the Spectre and Meltdown vulnerabilities that were recently released. These vulnerabilities impact the confidentiality of data running on Intel, AMD and ARM processors.</p>

<p>For Digi hardware products, we do not use Intel or AMD processors, and as a consequence the &quot;Meltdown&quot; vulnerability does not affect Digi hardware products.</p>

<p>For the Spectre vulnerability, Digi security teams are working to determine the practical impacts and patches on Digi hardware products that use ARM processors.</p>

<p>For Digi Remote Manager &amp; Device Cloud, we are working with our providers to address Spectre and Meltdown.</p>

<p>Additional information will be provided as soon as it is available. For more information on these vulnerabilities, please see the website <a href="https://meltdownattack.com/">https://meltdownattack.com/</a></p>

<p>Please continue to check this space for updates, or subscribe to the RSS feed above.</p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Fri, 05 Jan 2018 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=5cc89dc1-b3cd-47b3-a89f-a814715e16c7</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Discovered vulnerabilities with TransPort WR Series cellular routers]]>
</title>
<description>
   <![CDATA[<p>Three vulnerabilities have been found by Kasperski Labs within the WR series transport routers. These vulnerabilities are rated from high to low. The impacted devices are the Digi TransPort WR11,WR21,WR41,WR44, and the WR31. This includes &quot;R&quot;, and &quot;RR&quot; versions as well. Impacted vulnerable services are SNMP, FTP, and the command line interface. For more information on the discovered vulnerabilities, including patches, mitigations, and overall risk, please see the <a href="https://www.digi.com/support/knowledge-base/discovered-security-vulnerabilities-within-the-dig">knowledge base article</a>.</p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/support/knowledge-base/discovered-security-vulnerabilities-within-the-dig]]>
</link>  
<pubDate>Wed, 29 Nov 2017 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=1cc8cdb0-e187-40d1-807f-6440d6371a98</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Blueborne Vulnerability]]>
</title>
<description>
   <![CDATA[<p>Digi is aware of the BlueBorne vulnerability related to the penetration of Bluetooth connections resulting in potentially unauthorized access to devices and/or data. BlueBorne affects ordinary computers, mobile phones, embedded devices, and other connected devices with Bluetooth connectivity. Please refer to <a href="https://www.armis.com/blueborne/">https://www.armis.com/blueborne/</a> for detailed information about the vulnerability. For embedded products, we strongly recommend customers to review the available public information about the Blueborne vulnerability and apply mitigation approaches, including already available fixes in the community. We also intend to provide fixes/workaround for the related vulnerabilities as soon as possible. In the meantime, please <a href="https://www.digi.com/contactus">contact us</a> if you have any questions related to how this vulnerability may affect the Digi products/platforms you are using.</p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Mon, 30 Oct 2017 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=6070cb69-e33d-4bab-930e-3346a1ac3c98</guid>
</item>
<item>
<title>
   <![CDATA[Alert - DNSmasq Network service (CVE-2017-14491)]]>
</title>
<description>
   <![CDATA[<p>We have evaluated the impact of this vulnerability on our devices, and have concluded that the Transport LR54 is the only Digi device effected. We have made available a patch for this vulnerability in firmware versions 3.1.0.4 and above. Please see the <a href="https://hub.digi.com/support/products/cellular-routers/digi-lr54/">Digi support site for firmware releases for the LR54 product</a>.</p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Fri, 20 Oct 2017 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=53640ada-76e5-41c0-8337-50e9862493d2</guid>
</item>
<item>
<title>
   <![CDATA[Alert - KRACK Attack]]>
</title>
<description>
   <![CDATA[<p>Digi is aware of a vulnerability within the defined Wi-Fi security protocol WPA2. This has been defined as the KRACK Attack. we have released new firmware for impacted products, For a full technical statement on affected products and workarounds, <a href="https://www.digi.com/support/knowledge-base/krack-patch-status">please see our knowledge base article</a>.</p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Mon, 16 Oct 2017 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=106557d9-cd69-492d-9f44-6ec23f42aa90</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Mirai Botnet Impact Investigations]]>
</title>
<description>
   <![CDATA[<p>At this time, we have reviewed this, and we are not aware of any of our devices that can be compromized by this Botnet. We are continuing to monitor this in case this changes in the future.</p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Sun, 01 Oct 2017 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=4515fade-3711-447c-8bbe-6d19843424fe</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Evaluation of Security Vulnerability VU#561444]]>
</title>
<description>
   <![CDATA[<p>Expanded info on CVE-2014-9222, CVE-2014-9223<br />
Many Digi products contain and use the RomPager by Allegrosoft web server technology. It has come to our attention that this embedded web server, which is used for management of our devices contains what we have defined as a critical vulnerability. We urge any customer who may have one of these products where the administrative webserver is available on non-secure networks to either upgrade the firmware to a patched version or to disable the web server for management of these devices.</p>
]]>
</description>
<link>
<![CDATA[/support/knowledge-base/rompager-evaluation-of-security-vulnerability-vu-5]]>
</link>  
<pubDate>Wed, 03 May 2017 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=f9b46384-24ea-47fc-b328-02a1e962fa46</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Practical exploits to SHA1 hashing has now been discovered]]>
</title>
<description>
   <![CDATA[<p>Although we have been migrating our products use of SHA1 for the last few years, we are re-evaluating our products for any remaining SHA1 hash use. We anticipate that future releases will remove the SHA1 hash use, and move to the stronger SHA3, or SHA2 routines respectively.</p>
]]>
</description>
<link>
<![CDATA[https://arstechnica.com/security/2017/02/at-deaths-door-for-years-widely-used-sha1-function-is-now-dead/]]>
</link>  
<pubDate>Fri, 03 Mar 2017 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=2cff7a10-b4dd-486c-88d1-5d2fe174b0af</guid>
</item>
<item>
<title>
   <![CDATA[Alert - OpenSSL - New Security Release 1.1.0c]]>
</title>
<description>
   <![CDATA[<p>We are still reviewing the impact of this on our devices. we believe that this will not have any impact for Digi, as we use the OpenSSL long term support (LTS) version of Openssl v1.0.2 in our products, and not v1.1.0.</p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Thu, 10 Nov 2016 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=6d7f3bba-1172-41b7-9bb0-5ce8a0766a50</guid>
</item>
<item>
<title>
   <![CDATA[Alert - Dirty COW - (CVE-2016-5195)]]>
</title>
<description>
   <![CDATA[<p>We are in the process of fully testing our products against this vulnerability. Currently, we have found a few devices that are slightly impacted. However, due to the product type, there is no way to effectively exploit the devices with this vulnerability.</p>
]]>
</description>
<link>
<![CDATA[https://www.digi.com/security]]>
</link>  
<pubDate>Fri, 21 Oct 2016 13:00:00 GMT</pubDate>
<guid>https://www.digi.com/security?guid=5a04eaf1-e3c7-43e6-ae1f-b881ecf39faa</guid>
</item>

</channel>
</rss>