Back to overview

Phoenix Contact: Multiple mGuard devices are vulnerable to a remote code injection due to SSH

VDE-2024-051
Last update
05/14/2025 15:00
Published at
09/10/2024 12:00
Vendor(s)
Phoenix Contact GmbH & Co. KG
External ID
VDE-2024-051
CSAF Document

Summary

mGuards use an OpenSSH server for SSH access. This server is vulnerable to a remote code injection.

Impact

Attackers can inject code in the SSH server, which is run with high privileges.

Affected Product(s)

Model no. Product name Affected versions
1357828 FL MGUARD 2102 Firmware <10.4.1
1357850 FL MGUARD 2105 Firmware <10.4.1
1441187 FL MGUARD 4102 PCI Firmware <10.4.1
1357842 FL MGUARD 4102 PCIE Firmware <10.4.1
1357840 FL MGUARD 4302 Firmware <10.4.1
1357875 FL MGUARD 4305 Firmware <10.4.1
2702547 FL MGUARD CENTERPORT Firmware <8.9.3
2702820 FL MGUARD CENTERPORT VPN-1000 Firmware <8.9.3
2702884 FL MGUARD CORE TX Firmware <8.9.3
2702831 FL MGUARD CORE TX VPN Firmware <8.9.3
2700967 FL MGUARD DELTA TX/TX Firmware <8.9.3
2700968 FL MGUARD DELTA TX/TX VPN Firmware <8.9.3
2700197 FL MGUARD GT/GT Firmware <8.9.3
2700198 FL MGUARD GT/GT VPN Firmware <8.9.3
2701274 FL MGUARD PCI4000 Firmware <8.9.3
2701275 FL MGUARD PCI4000 VPN Firmware <8.9.3
2701277 FL MGUARD PCIE4000 Firmware <8.9.3
2701278 FL MGUARD PCIE4000 VPN Firmware <8.9.3
2700642 FL MGUARD RS2000 TX/TX VPN Firmware <8.9.3
2702139 FL MGUARD RS2000 TX/TX-B Firmware <8.9.3
2701875 FL MGUARD RS2005 TX VPN Firmware <8.9.3
2700634 FL MGUARD RS4000 TX/TX Firmware <8.9.3
2200515 FL MGUARD RS4000 TX/TX VPN Firmware <8.9.3
2702470 FL MGUARD RS4000 TX/TX-M Firmware <8.9.3
2702259 FL MGUARD RS4000 TX/TX-P Firmware <8.9.3
2701876 FL MGUARD RS4004 TX/DTX Firmware <8.9.3
2701877 FL MGUARD RS4004 TX/DTX VPN Firmware <8.9.3
2700640 FL MGUARD SMART2 Firmware <8.9.3
2700639 FL MGUARD SMART2 VPN Firmware <8.9.3
2903441 TC MGUARD RS2000 3G VPN Firmware <8.9.3
1010464 TC MGUARD RS2000 4G ATT VPN Firmware <8.9.3
2903588 TC MGUARD RS2000 4G VPN Firmware <8.9.3
1010462 TC MGUARD RS2000 4G VZW VPN Firmware <8.9.3
2903440 TC MGUARD RS4000 3G VPN Firmware <8.9.3
1010463 TC MGUARD RS4000 4G ATT VPN Firmware <8.9.3
2903586 TC MGUARD RS4000 4G VPN Firmware <8.9.3
1010461 TC MGUARD RS4000 4G VZW VPN Firmware <8.9.3

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:57
Weakness
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') (CWE-362)
Summary

A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.

References

Mitigation

Access to the SSH server should be limited to trustworthy networks or peers.
Remote access to the SSH server should be disabled.

Remediation

Phoenix Contact strongly recommends upgrading affected mGuard devices to firmware version 8.9.3 / 10.4.1 or higher which fixes this vulnerability.

Revision History

Version Date Summary
1 09/10/2024 12:00 Initial revision.
2 11/06/2024 12:27 Fix: correct certvde domain, added self-reference
3 04/10/2025 15:00 Fixed CSAF reference URL
4 05/14/2025 15:00 Fix: added distribution