Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-43386— Phoenix Contact: OS command execution through EMAIL_NOTIFICATION.TO in mGuard devices.

CVSS 8.8 · High EPSS 2.46% · P85
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-43386

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Phoenix Contact: OS command execution through EMAIL_NOTIFICATION.TO in mGuard devices.
Source: NVD (National Vulnerability Database)
Vulnerability Description
A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of special elements in the variable EMAIL_NOTIFICATION.TO in mGuard devices.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
PHOENIX CONTACT FL/TC MGUARD 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
PHOENIX CONTACT FL/TC MGUARD是德国菲尼克斯电气(PHOENIX)公司的一系列路由器。 PHOENIX CONTACT FL/TC MGUARD存在安全漏洞,该漏洞源于 mGuard 设备中变量 EMAIL_NOTIFICATION.TO 中特殊元素的不正确中和,低特权远程攻击者可以触发以 root 身份执行任意操作系统命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
PHOENIX CONTACTFL MGUARD 2102 0 ~ 10.4.1 -
PHOENIX CONTACTFL MGUARD 2105 0 ~ 10.4.1 -
PHOENIX CONTACTFL MGUARD 4102 PCI 0 ~ 10.4.1 -
PHOENIX CONTACTFL MGUARD 4102 PCIE 0 ~ 10.4.1 -
PHOENIX CONTACTFL MGUARD 4302 0 ~ 10.4.1 -
PHOENIX CONTACTFL MGUARD 4305 0 ~ 10.4.1 -
PHOENIX CONTACTFL MGUARD CENTERPORT VPN-1000 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD CORE TX 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD CORE TX VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD DELTA TX/TX 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD DELTA TX/TX VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD GT/GT 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD GT/GT VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD PCI4000 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD PCI4000 VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD PCIE4000 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD PCIE4000 VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS2000 TX/TX-B 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS2000 TX/TX VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS2005 TX VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS4000 TX/TX 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS4000 TX/TX-M 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS4000 TX/TX-P 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS4000 TX/TX VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS4004 TX/DTX 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS4004 TX/DTX VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD SMART2 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD SMART2 VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS2000 3G VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS2000 4G ATT VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS2000 4G VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS2000 4G VZW VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS4000 3G VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS4000 4G ATT VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS4000 4G VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS4000 4G VZW VPN 0 ~ 8.9.3 -

II. Public POCs for CVE-2024-43386

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-43386

登录查看更多情报信息。

Same Patch Batch · PHOENIX CONTACT · 2024-09-10 · 12 CVEs total

CVE-2024-76998.8 HIGHPhoenix Contact: OS command execution in MGUARD products
CVE-2024-433878.8 HIGHPhoenix Contact: Access files due to improper neutralization of special elements in MGUARD
CVE-2024-433888.8 HIGHPhoenix Contact: SNMP reconfiguration due to improper input validation in MGUARD devices
CVE-2024-433858.8 HIGHPhoenix Contact: OS command execution through PROXY_HTTP_PORT in mGuard devices
CVE-2024-433918.1 HIGHPhoenix Contact: Firewall reconfiguration through the FW_PORTFORWARDING.SRC_IP in MGUARD d
CVE-2024-433898.1 HIGHPhoenix Contact: OSPF reconfiguration due to improper input validation in MGUARD devices
CVE-2024-433938.1 HIGHPhoenix Contact: Configuration changes of the firewall services can lead to DoS in MGUARD
CVE-2024-433908.1 HIGHPhoenix Contact: Firewall reconfiguration due to improper input validation in MGUARD devic
CVE-2024-433928.1 HIGHPhoenix Contact: Firewall reconfiguration through the FW_environment variables in MGUARD
CVE-2024-76985.7 MEDIUMPhoenix Contact: Access to CSRF tokens of higher privileged users in MGUARD products
CVE-2024-77345.3 MEDIUMPhoenix Contact: Multiple mGuard devices are vulnerable to a drain of open file descriptor

IV. Related Vulnerabilities

V. Comments for CVE-2024-43386

No comments yet


Leave a comment