Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-43391— Phoenix Contact: Firewall reconfiguration through the FW_PORTFORWARDING.SRC_IP in MGUARD devices

CVSS 8.1 · High EPSS 0.89% · P76
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-43391

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Phoenix Contact: Firewall reconfiguration through the FW_PORTFORWARDING.SRC_IP in MGUARD devices
Source: NVD (National Vulnerability Database)
Vulnerability Description
A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_PORTFORWARDING.SRC_IP environment variable which can lead to a DoS.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
对生成代码的控制不恰当(代码注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
PHOENIX CONTACT FL/TC MGUARD 注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
PHOENIX CONTACT FL/TC MGUARD是德国菲尼克斯电气(PHOENIX)公司的一系列路由器。 PHOENIX CONTACT FL/TC MGUARD存在注入漏洞。低权限远程攻击者可以通过 FW_PORTFORWARDING.SRC_IP 环境变量执行防火墙服务的配置更改,包括数据包过滤、数据包转发、网络访问控制或 NAT,这可能导致拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
PHOENIX CONTACTFL MGUARD 2102 0 ~ 10.4.1 -
PHOENIX CONTACTFL MGUARD 2105 0 ~ 10.4.1 -
PHOENIX CONTACTFL MGUARD 4102 PCI 0 ~ 10.4.1 -
PHOENIX CONTACTFL MGUARD 4102 PCIE 0 ~ 10.4.1 -
PHOENIX CONTACTFL MGUARD 4302 0 ~ 10.4.1 -
PHOENIX CONTACTFL MGUARD 4305 0 ~ 10.4.1 -
PHOENIX CONTACTFL MGUARD CENTERPORT VPN-1000 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD CORE TX 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD CORE TX VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD DELTA TX/TX 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD DELTA TX/TX VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD GT/GT 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD GT/GT VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD PCI4000 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD PCI4000 VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD PCIE4000 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD PCIE4000 VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS2000 TX/TX-B 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS2000 TX/TX VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS2005 TX VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS4000 TX/TX 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS4000 TX/TX-M 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS4000 TX/TX-P 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS4000 TX/TX VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS4004 TX/DTX 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS4004 TX/DTX VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD SMART2 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD SMART2 VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS2000 3G VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS2000 4G ATT VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS2000 4G VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS2000 4G VZW VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS4000 3G VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS4000 4G ATT VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS4000 4G VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS4000 4G VZW VPN 0 ~ 8.9.3 -

II. Public POCs for CVE-2024-43391

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-43391

登录查看更多情报信息。

Same Patch Batch · PHOENIX CONTACT · 2024-09-10 · 12 CVEs total

CVE-2024-76998.8 HIGHPhoenix Contact: OS command execution in MGUARD products
CVE-2024-433878.8 HIGHPhoenix Contact: Access files due to improper neutralization of special elements in MGUARD
CVE-2024-433888.8 HIGHPhoenix Contact: SNMP reconfiguration due to improper input validation in MGUARD devices
CVE-2024-433868.8 HIGHPhoenix Contact: OS command execution through EMAIL_NOTIFICATION.TO in mGuard devices.
CVE-2024-433858.8 HIGHPhoenix Contact: OS command execution through PROXY_HTTP_PORT in mGuard devices
CVE-2024-433898.1 HIGHPhoenix Contact: OSPF reconfiguration due to improper input validation in MGUARD devices
CVE-2024-433938.1 HIGHPhoenix Contact: Configuration changes of the firewall services can lead to DoS in MGUARD
CVE-2024-433908.1 HIGHPhoenix Contact: Firewall reconfiguration due to improper input validation in MGUARD devic
CVE-2024-433928.1 HIGHPhoenix Contact: Firewall reconfiguration through the FW_environment variables in MGUARD
CVE-2024-76985.7 MEDIUMPhoenix Contact: Access to CSRF tokens of higher privileged users in MGUARD products
CVE-2024-77345.3 MEDIUMPhoenix Contact: Multiple mGuard devices are vulnerable to a drain of open file descriptor

IV. Related Vulnerabilities

V. Comments for CVE-2024-43391

No comments yet


Leave a comment