3 results (0.061 seconds)

CVSS: 5.3EPSS: 0%CPEs: 52EXPL: 0

Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allow UDP packets to bypass the filter rules and access the solely connected device behind the MGUARD which can be used for flooding attacks. • https://cert.vde.com/en/advisories/VDE-2023-010 • CWE-20: Improper Input Validation CWE-1287: Improper Validation of Specified Type of Input •

CVSS: 7.5EPSS: 0%CPEs: 62EXPL: 0

A remote, unauthenticated attacker could cause a denial-of-service of PHOENIX CONTACT FL MGUARD and TC MGUARD devices below version 8.9.0 by sending a larger number of unauthenticated HTTPS connections originating from different source IP’s. Configuring firewall limits for incoming connections cannot prevent the issue. Un atacante remoto no autenticado podría provocar una Denegación de Servicio (DoS) de los dispositivos PHOENIX CONTACT FL MGUARD y TC MGUARD inferiores a la versión 8.9.0 al enviar una mayor cantidad de conexiones HTTPS no autenticadas que se originan desde diferentes IP de origen. Configurar los límites de firewall para conexiones entrantes no puede evitar el problema. • https://cert.vde.com/en/advisories/VDE-2022-051 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 7.8EPSS: 0%CPEs: 46EXPL: 0

An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmware versions 7.2 to 8.6.0. mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages. Se ha descubierto un problema de validación indebida de valores de comprobación de integridad en PHOENIX CONTACT mGuard, en versiones de firmware 7.2 a 8.6.0. Los dispositivos mGuard dependen de sumas de verificación internas para verificar la integridad interna de los paquetes de actualización. La verificación podría no realizarse siempre correctamente, lo que permite que un atacante modifique paquetes de actualización de firmware. • http://www.securityfocus.com/bid/102907 https://cert.vde.com/en-us/advisories/vde-2018-001 https://ics-cert.us-cert.gov/advisories/ICSA-18-030-01 • CWE-20: Improper Input Validation CWE-354: Improper Validation of Integrity Check Value •