QID 591248

Date Published: 2022-12-23

QID 591248: Phoenix Contact mGuard product family Denial of Service (DoS) Vulnerability (VDE-2022-051)

AFFECTED PRODUCTS
FL MGUARD CENTERPORT: All Versions prior to 8.9.0
FL MGUARD CENTERPORT VPN-1000: All Versions prior to 8.9.0
FL MGUARD CORE TX: All Versions prior to 8.9.0
FL MGUARD CORE TX VPN: All Versions prior to 8.9.0
FL MGUARD DELTA TX/TX: All Versions prior to 8.9.0
FL MGUARD DELTA TX/TX VPN: All Versions prior to 8.9.0
FL MGUARD GT/GT: All Versions prior to 8.9.0
FL MGUARD GT/GT VPN: All Versions prior to 8.9.0
FL MGUARD PCI4000: All Versions prior to 8.9.0
FL MGUARD PCI4000 VPN: All Versions prior to 8.9.0
FL MGUARD PCIE4000: All Versions prior to 8.9.0
FL MGUARD PCIE4000 VPN: All Versions prior to 8.9.0
FL MGUARD RS2000 TX/TX-B: All Versions prior to 8.9.0
FL MGUARD RS2000 TX/TX VPN: All Versions prior to 8.9.0
FL MGUARD RS2005 TX VPN: All Versions prior to 8.9.0
FL MGUARD RS4000 TX/TX: All Versions prior to 8.9.0
FL MGUARD RS4000 TX/TX-M: All Versions prior to 8.9.0
FL MGUARD RS4000 TX/TX-P: All Versions prior to 8.9.0
FL MGUARD RS4000 TX/TX VPN: All Versions prior to 8.9.0
FL MGUARD RS4004 TX/DTX: All Versions prior to 8.9.0
FL MGUARD RS4004 TX/DTX VPN: All Versions prior to 8.9.0
FL MGUARD SMART2: All Versions prior to 8.9.0
FL MGUARD SMART2 VPN: All Versions prior to 8.9.0
TC MGUARD RS2000 3G VPN: All Versions prior to 8.9.0
TC MGUARD RS2000 4G ATT VPN: All Versions prior to 8.9.0
TC MGUARD RS2000 4G VPN: All Versions prior to 8.9.0
TC MGUARD RS2000 4G VZW VPN: All Versions prior to 8.9.0
TC MGUARD RS4000 3G VPN: All Versions prior to 8.9.0
TC MGUARD RS4000 4G ATT VPN: All Versions prior to 8.9.0
TC MGUARD RS4000 4G VPN: All Versions prior to 8.9.0
TC MGUARD RS4000 4G VZW VPN: All Versions prior to 8.9.0

QID Detection Logic:
This QID checks for the Vulnerable version of Phoenix Contact mGuard product family using passive scanning

A remote, unauthenticated attacker could cause a denial-of-service of PHOENIX CONTACT FL MGUARD and TC MGUARD devices below version 8.9.0 by sending a larger number of unauthenticated HTTPS connections originating from different source IP's. Configuring firewall limits for incoming connections cannot prevent the issue.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as High - 7.8 severity.
  • Solution

    Customers are advised to refer to cert.vde MITIGATIONS section VDE-2022-051 for affected packages and patching details.

    Vendor References

    CVEs related to QID 591248

    Software Advisories
    Advisory ID Software Component Link
    VDE-2022-051 URL Logo cert.vde.com/de/advisories/VDE-2022-051/