Article No° | Product Name | Affected Version(s) |
---|---|---|
FL MGUARD 2102 | < 10.4.1 | |
FL MGUARD 2105 | < 10.4.1 | |
FL MGUARD 4102 PCI | < 10.4.1 | |
FL MGUARD 4102 PCIE | < 10.4.1 | |
FL MGUARD 4302 | < 10.4.1 | |
FL MGUARD 4305 | < 10.4.1 | |
FL MGUARD CENTERPORT VPN-1000 | < 8.9.3 | |
FL MGUARD CORE TX | < 8.9.3 | |
FL MGUARD CORE TX VPN | < 8.9.3 | |
FL MGUARD DELTA TX/TX | < 8.9.3 | |
FL MGUARD DELTA TX/TX VPN | < 8.9.3 | |
FL MGUARD GT/GT | < 8.9.3 | |
FL MGUARD GT/GT VPN | < 8.9.3 | |
FL MGUARD PCI4000 | < 8.9.3 | |
FL MGUARD PCI4000 VPN | < 8.9.3 | |
FL MGUARD PCIE4000 | < 8.9.3 | |
FL MGUARD PCIE4000 VPN | < 8.9.3 | |
FL MGUARD RS2000 TX/TX-B | < 8.9.3 | |
FL MGUARD RS2000 TX/TX VPN | < 8.9.3 | |
FL MGUARD RS2005 TX VPN | < 8.9.3 | |
FL MGUARD RS4000 TX/TX | < 8.9.3 | |
FL MGUARD RS4000 TX/TX-M | < 8.9.3 | |
FL MGUARD RS4000 TX/TX-P | < 8.9.3 | |
FL MGUARD RS4000 TX/TX VPN | < 8.9.3 | |
FL MGUARD RS4004 TX/DTX | < 8.9.3 | |
FL MGUARD RS4004 TX/DTX VPN | < 8.9.3 | |
FL MGUARD SMART2 | < 8.9.3 | |
FL MGUARD SMART2 VPN | < 8.9.3 | |
TC MGUARD RS2000 3G VPN | < 8.9.3 | |
TC MGUARD RS2000 4G ATT VPN | < 8.9.3 | |
TC MGUARD RS2000 4G VPN | < 8.9.3 | |
TC MGUARD RS2000 4G VZW VPN | < 8.9.3 | |
TC MGUARD RS4000 3G VPN | < 8.9.3 | |
TC MGUARD RS4000 4G ATT VPN | < 8.9.3 | |
TC MGUARD RS4000 4G VPN | < 8.9.3 | |
TC MGUARD RS4000 4G VZW VPN | < 8.9.3 |
Confidential data in HTTP query string of user requests. Incomplete sanitation of user input in administrative web interface.
CVE-2024-43392 only affects devices with firmware < 8.9.3.
A low privileged remote attacker with write permissions can reconfigure the SNMP service due to improper input validation.
An low privileged remote attacker can execute OS commands with root privileges due to improper neutralization of special elements in user data.
A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of special elements in the variable PROXY_HTTP_PORT in mGuard devices.
A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of special elements in the variable EMAIL_NOTIFICATION.TO in mGuard devices.
A low privileged remote attacker can read and write files as root due to improper neutralization of special elements in the variable EMAIL_RELAY_PASSWORD in mGuard devices.
A low privileged remote attacker can gain the root password due to improper removal of sensitive information before storage or transfer.
A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_INCOMING.FROM_IP FW_INCOMING.IN_IP FW_OUTGOING.FROM_IP FW_OUTGOING.IN_IP FW_RULESETS.FROM_IP FW_RULESETS.IN_IP environment variable which can lead to a DoS.
A low privileged remote attacker can perform configuration changes of the ospf service through OSPF_INTERFACE.SIMPLE_KEY, OSPF_INTERFACE.DIGEST_KEY environment variables which can lead to a DoS.
A low privileged remote attacker can perform configuration changes of the firewall services, including packet forwarding or NAT through the FW_NAT.IN_IP environment variable which can lead to a DoS.
A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_PORTFORWARDING.SRC_IP environment variable which can lead to a DoS.
A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_INCOMING.FROM_IP FW_INCOMING.IN_IP FW_OUTGOING.FROM_IP FW_OUTGOING.IN_IP environment variable which can lead to a DoS.
A low privileged remote attacker can get access to CSRF tokens of higher privileged users which can be abused to mount CSRF attacks.
Attackers can gain knowledge of confidential user data. Attackers can escalate their privileges on the system. Attackers can trigger covert misbehavior within several services.
Mitigation
Access to the administrative interfaces should be granted only to trustworthy users.
Remediation
Phoenix Contact strongly recommends upgrading affected mGuard devices to firmware version 8.9.3 / 10.4.1 or higher which fixes these vulnerabilities.
CVE-2024-43392 only affects devices with firmware < 8.9.3.
CERT@VDE coordinated with Phoenix Contact
These vulnerabilities were discovered by Andrea Palanca from Nozomi Networks Security Research Team.