Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Phoenix Contact — Vulnerabilities & Security Advisories 143

Browse all 143 CVE security advisories affecting Phoenix Contact. AI-powered Chinese analysis, POCs, and references for each vulnerability.

PHOENIX CONTACT specializes in industrial automation, electrical engineering, and electronics, providing critical infrastructure components such as programmable logic controllers, power supplies, and industrial networking devices. With 142 recorded CVEs, the company’s software ecosystem has historically been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities. These flaws often stem from inadequate input validation in web-based management interfaces or insecure default configurations in embedded systems. Notable incidents include exploitable authentication bypasses and buffer overflow errors that could allow attackers to gain unauthorized control over industrial control systems. The high volume of vulnerabilities suggests persistent challenges in securing legacy firmware and web applications. While the hardware itself is robust, the associated software layers require rigorous patching and secure coding practices to mitigate risks in operational technology environments.

Found 14 results / 143Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2024-43384 Phoenix Contact: Improper removal of sensitive information in MGUARD products — FL MGUARD 2102CWE-212 8.0 High2026-05-07
CVE-2024-43393 Phoenix Contact: Configuration changes of the firewall services can lead to DoS in MGUARD devices — FL MGUARD 2102CWE-94 8.1 High2024-09-10
CVE-2024-43392 Phoenix Contact: Firewall reconfiguration through the FW_environment variables in MGUARD devices — FL MGUARD 2102CWE-94 8.1 High2024-09-10
CVE-2024-43391 Phoenix Contact: Firewall reconfiguration through the FW_PORTFORWARDING.SRC_IP in MGUARD devices — FL MGUARD 2102CWE-94 8.1 High2024-09-10
CVE-2024-43390 Phoenix Contact: Firewall reconfiguration due to improper input validation in MGUARD devices — FL MGUARD 2102CWE-94 8.1 High2024-09-10
CVE-2024-43389 Phoenix Contact: OSPF reconfiguration due to improper input validation in MGUARD devices — FL MGUARD 2102CWE-94 8.1 High2024-09-10
CVE-2024-43388 Phoenix Contact: SNMP reconfiguration due to improper input validation in MGUARD devices — FL MGUARD 2102CWE-94 8.8 High2024-09-10
CVE-2024-43387 Phoenix Contact: Access files due to improper neutralization of special elements in MGUARD devices — FL MGUARD 2102CWE-78 8.8 High2024-09-10
CVE-2024-43386 Phoenix Contact: OS command execution through EMAIL_NOTIFICATION.TO in mGuard devices. — FL MGUARD 2102CWE-78 8.8 High2024-09-10
CVE-2024-43385 Phoenix Contact: OS command execution through PROXY_HTTP_PORT in mGuard devices — FL MGUARD 2102CWE-78 8.8 High2024-09-10
CVE-2024-7699 Phoenix Contact: OS command execution in MGUARD products — FL MGUARD 2102CWE-78 8.8 High2024-09-10
CVE-2024-7698 Phoenix Contact: Access to CSRF tokens of higher privileged users in MGUARD products — FL MGUARD 2102CWE-201 5.7 Medium2024-09-10
CVE-2024-7734 Phoenix Contact: Multiple mGuard devices are vulnerable to a drain of open file descriptors. — FL MGUARD 2102CWE-770 5.3 Medium2024-09-10
CVE-2023-2673 PHOENIX CONTACT: FL/TC MGUARD prone to Improper Input Validation — FL MGUARD 2102CWE-1287 5.3 Medium2023-06-13

This page lists every published CVE security advisory associated with Phoenix Contact. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.