Digi ConnectPort X2D
The Digi ConnectPort X2D Gateway manufactured before January 2020 contains a vulnerability (CWE-250: Execution with Unnecessary Privileges) that allows an attacker to execute arbitrary code on the device. Successful exploitation could result in complete compromise of the gateway, potentially allowing interception or manipulation of control system communications. Digi International has not released a patch for this vulnerability; instead, the company indicates the vulnerability does not exist in gateways manufactured after January 2020.
- Network access to the ConnectPort X2D gateway (port unknown from advisory, but likely HTTP/HTTPS)
- The device must be running firmware version manufactured before January 2020
- No authentication credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c8536549-df18-4e08-86af-9de021998b65Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.