Show filters
133 Total Results
Displaying 61-70 of 133
Sort by:
Attacker Value
Unknown

CVE-2022-3480

Disclosure Date: November 15, 2022 (last updated November 09, 2023)
A remote, unauthenticated attacker could cause a denial-of-service of PHOENIX CONTACT FL MGUARD and TC MGUARD devices below version 8.9.0 by sending a larger number of unauthenticated HTTPS connections originating from different source IP’s. Configuring firewall limits for incoming connections cannot prevent the issue.
Attacker Value
Unknown

CVE-2021-34579

Disclosure Date: November 09, 2022 (last updated December 22, 2024)
In Phoenix Contact: FL MGUARD DM version 1.12.0 and 1.13.0 access to the Apache web server being installed as part of the FL MGUARD DM on Microsoft Windows does not require login credentials even if configured during installation.Attackers with network access to the Apache web server can download and therefore read mGuard configuration profiles (“ATV profiles”). Such configuration profiles may contain sensitive information, e.g. private keys associated with IPsec VPN connections.
Attacker Value
Unknown

CVE-2022-31801

Disclosure Date: June 21, 2022 (last updated November 29, 2024)
An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
0
Attacker Value
Unknown

CVE-2022-31800

Disclosure Date: June 20, 2022 (last updated November 29, 2024)
An unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
0
Attacker Value
Unknown

CVE-2022-29897

Disclosure Date: May 11, 2022 (last updated November 29, 2024)
On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin user could use the traceroute utility integrated in the WebUI to execute arbitrary code with root privileges on the OS due to an improper input validation in all versions of the firmware.
0
Attacker Value
Unknown

CVE-2022-29898

Disclosure Date: May 11, 2022 (last updated November 29, 2024)
On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin user could use the configuration file uploader in the WebUI to execute arbitrary code with root privileges on the OS due to an improper validation of an integrity check value in all versions of the firmware.
0
Attacker Value
Unknown

CVE-2022-22509

Disclosure Date: January 25, 2022 (last updated February 23, 2025)
In Phoenix Contact FL SWITCH Series 2xxx in version 3.00 an incorrect privilege assignment allows an low privileged user to enable full access to the device configuration.
Attacker Value
Unknown

CVE-2021-34598

Disclosure Date: November 10, 2021 (last updated February 23, 2025)
In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 the remote logging functionality is impaired by the lack of memory release for data structures from syslog-ng when remote logging is active
0
Attacker Value
Unknown

CVE-2021-34582

Disclosure Date: November 10, 2021 (last updated February 23, 2025)
In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 a user with high privileges can inject HTML code (XSS) through web-based management or the REST API with a manipulated certificate file.
Attacker Value
Unknown

CVE-2021-34597

Disclosure Date: November 03, 2021 (last updated February 23, 2025)
Improper Input Validation vulnerability in PC Worx Automation Suite of Phoenix Contact up to version 1.88 could allow an attacker with a manipulated project file to unpack arbitrary files outside of the selected project directory.
0