Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-7698— Phoenix Contact: Access to CSRF tokens of higher privileged users in MGUARD products

CVSS 5.7 · Medium EPSS 0.19% · P41
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-7698

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Phoenix Contact: Access to CSRF tokens of higher privileged users in MGUARD products
Source: NVD (National Vulnerability Database)
Vulnerability Description
A low privileged remote attacker can get access to CSRF tokens of higher privileged users which can be abused to mount CSRF attacks.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
通过发送数据的信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
PHOENIX CONTACT FL/TC MGUARD 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
PHOENIX CONTACT FL/TC MGUARD是德国菲尼克斯电气(PHOENIX)公司的一系列路由器。 PHOENIX CONTACT FL/TC MGUARD存在安全漏洞。低特权的远程攻击者可以访问高特权用户的 CSRF 令牌,这些令牌可被滥用来发动 CSRF 攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
PHOENIX CONTACTFL MGUARD 2102 0 ~ 10.4.1 -
PHOENIX CONTACTFL MGUARD 2105 0 ~ 10.4.1 -
PHOENIX CONTACTFL MGUARD 4102 PCI 0 ~ 10.4.1 -
PHOENIX CONTACTFL MGUARD 4102 PCIE 0 ~ 10.4.1 -
PHOENIX CONTACTFL MGUARD 4302 0 ~ 10.4.1 -
PHOENIX CONTACTFL MGUARD 4305 0 ~ 10.4.1 -
PHOENIX CONTACTFL MGUARD CENTERPORT VPN-1000 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD CORE TX 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD CORE TX VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD DELTA TX/TX 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD DELTA TX/TX VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD GT/GT 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD GT/GT VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD PCI4000 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD PCI4000 VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD PCIE4000 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD PCIE4000 VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS2000 TX/TX-B 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS2000 TX/TX VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS2005 TX VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS4000 TX/TX 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS4000 TX/TX-M 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS4000 TX/TX-P 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS4000 TX/TX VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS4004 TX/DTX 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD RS4004 TX/DTX VPN 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD SMART2 0 ~ 8.9.3 -
PHOENIX CONTACTFL MGUARD SMART2 VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS2000 3G VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS2000 4G ATT VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS2000 4G VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS2000 4G VZW VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS4000 3G VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS4000 4G ATT VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS4000 4G VPN 0 ~ 8.9.3 -
PHOENIX CONTACTTC MGUARD RS4000 4G VZW VPN 0 ~ 8.9.3 -

II. Public POCs for CVE-2024-7698

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-7698

登录查看更多情报信息。

Same Patch Batch · PHOENIX CONTACT · 2024-09-10 · 12 CVEs total

CVE-2024-76998.8 HIGHPhoenix Contact: OS command execution in MGUARD products
CVE-2024-433878.8 HIGHPhoenix Contact: Access files due to improper neutralization of special elements in MGUARD
CVE-2024-433888.8 HIGHPhoenix Contact: SNMP reconfiguration due to improper input validation in MGUARD devices
CVE-2024-433868.8 HIGHPhoenix Contact: OS command execution through EMAIL_NOTIFICATION.TO in mGuard devices.
CVE-2024-433858.8 HIGHPhoenix Contact: OS command execution through PROXY_HTTP_PORT in mGuard devices
CVE-2024-433918.1 HIGHPhoenix Contact: Firewall reconfiguration through the FW_PORTFORWARDING.SRC_IP in MGUARD d
CVE-2024-433898.1 HIGHPhoenix Contact: OSPF reconfiguration due to improper input validation in MGUARD devices
CVE-2024-433938.1 HIGHPhoenix Contact: Configuration changes of the firewall services can lead to DoS in MGUARD
CVE-2024-433908.1 HIGHPhoenix Contact: Firewall reconfiguration due to improper input validation in MGUARD devic
CVE-2024-433928.1 HIGHPhoenix Contact: Firewall reconfiguration through the FW_environment variables in MGUARD
CVE-2024-77345.3 MEDIUMPhoenix Contact: Multiple mGuard devices are vulnerable to a drain of open file descriptor

IV. Related Vulnerabilities

V. Comments for CVE-2024-7698

No comments yet


Leave a comment