2 results (0.005 seconds)

CVSS: 5.3EPSS: 0%CPEs: 52EXPL: 0

Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allow UDP packets to bypass the filter rules and access the solely connected device behind the MGUARD which can be used for flooding attacks. • https://cert.vde.com/en/advisories/VDE-2023-010 • CWE-20: Improper Input Validation CWE-1287: Improper Validation of Specified Type of Input •

CVSS: 7.5EPSS: 0%CPEs: 62EXPL: 0

A remote, unauthenticated attacker could cause a denial-of-service of PHOENIX CONTACT FL MGUARD and TC MGUARD devices below version 8.9.0 by sending a larger number of unauthenticated HTTPS connections originating from different source IP’s. Configuring firewall limits for incoming connections cannot prevent the issue. Un atacante remoto no autenticado podría provocar una Denegación de Servicio (DoS) de los dispositivos PHOENIX CONTACT FL MGUARD y TC MGUARD inferiores a la versión 8.9.0 al enviar una mayor cantidad de conexiones HTTPS no autenticadas que se originan desde diferentes IP de origen. Configurar los límites de firewall para conexiones entrantes no puede evitar el problema. • https://cert.vde.com/en/advisories/VDE-2022-051 • CWE-770: Allocation of Resources Without Limits or Throttling •