Show filters
15 Total Results
Displaying 11-15 of 15
Sort by:
Attacker Value
Unknown
CVE-2024-43385
Disclosure Date: September 10, 2024 (last updated September 28, 2024)
A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of special elements in the variable PROXY_HTTP_PORT in mGuard devices.
0
Attacker Value
Unknown
CVE-2024-7734
Disclosure Date: September 10, 2024 (last updated September 29, 2024)
An unauthenticated remote attacker can exploit the behavior of the pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to blocking of valid IPsec VPN peers.
0
Attacker Value
Unknown
CVE-2023-2673
Disclosure Date: June 13, 2023 (last updated October 08, 2023)
Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allow UDP packets to bypass the filter rules and access the solely connected device behind the MGUARD which can be used for flooding attacks.
0
Attacker Value
Unknown
CVE-2022-3480
Disclosure Date: November 15, 2022 (last updated November 09, 2023)
A remote, unauthenticated attacker could cause a denial-of-service of PHOENIX CONTACT FL MGUARD and TC MGUARD devices below version 8.9.0 by sending a larger number of unauthenticated HTTPS connections originating from different source IP’s. Configuring firewall limits for incoming connections cannot prevent the issue.
0
Attacker Value
Unknown
CVE-2020-12523
Disclosure Date: December 17, 2020 (last updated February 22, 2025)
On Phoenix Contact mGuard Devices versions before 8.8.3 LAN ports get functional after reboot even if they are disabled in the device configuration. For mGuard devices with integrated switch on the LAN side, single switch ports can be disabled by device configuration. After a reboot these ports get functional independent from their configuration setting: Missing Initialization of Resource
0