Article No° | Product Name | Affected Version(s) |
---|---|---|
FL MGUARD 2102 | < 10.4.1 | |
FL MGUARD 2105 | < 10.4.1 | |
FL MGUARD 4102 PCI | < 10.4.1 | |
FL MGUARD 4102 PCIE | < 10.4.1 | |
FL MGUARD 4302 | < 10.4.1 | |
FL MGUARD 4305 | < 10.4.1 | |
FL MGUARD CENTERPORT VPN-1000 | < 8.9.3 | |
FL MGUARD CORE TX | < 8.9.3 | |
FL MGUARD CORE TX VPN | < 8.9.3 | |
FL MGUARD DELTA TX/TX | < 8.9.3 | |
FL MGUARD DELTA TX/TX VPN | < 8.9.3 | |
FL MGUARD GT/GT | < 8.9.3 | |
FL MGUARD GT/GT VPN | < 8.9.3 | |
FL MGUARD PCI4000 | < 8.9.3 | |
FL MGUARD PCI4000 VPN | < 8.9.3 | |
FL MGUARD PCIE4000 | < 8.9.3 | |
FL MGUARD PCIE4000 VPN | < 8.9.3 | |
FL MGUARD RS2000 TX/TX-B | < 8.9.3 | |
FL MGUARD RS2000 TX/TX VPN | < 8.9.3 | |
FL MGUARD RS2005 TX VPN | < 8.9.3 | |
FL MGUARD RS4000 TX/TX | < 8.9.3 | |
FL MGUARD RS4000 TX/TX-M | < 8.9.3 | |
FL MGUARD RS4000 TX/TX-P | < 8.9.3 | |
FL MGUARD RS4000 TX/TX VPN | < 8.9.3 | |
FL MGUARD RS4004 TX/DTX | < 8.9.3 | |
FL MGUARD RS4004 TX/DTX VPN | < 8.9.3 | |
FL MGUARD SMART2 | < 8.9.3 | |
FL MGUARD SMART2 VPN | < 8.9.3 | |
TC MGUARD RS2000 3G VPN | < 8.9.3 | |
TC MGUARD RS2000 4G ATT VPN | < 8.9.3 | |
TC MGUARD RS2000 4G VPN | < 8.9.3 | |
TC MGUARD RS2000 4G VZW VPN | < 8.9.3 | |
TC MGUARD RS4000 3G VPN | < 8.9.3 | |
TC MGUARD RS4000 4G ATT VPN | < 8.9.3 | |
TC MGUARD RS4000 4G VPN | < 8.9.3 | |
TC MGUARD RS4000 4G VZW VPN | < 8.9.3 |
The pathfinder TCP encapsulation service is vulnerable to a drain of open file descriptors.
An unauthenticated remote attacker can exploit the behavior of the pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to blocking of valid IPsec VPN peers.
Attackers can trigger a denial-of-service of the pathfinder TCP encapsulation service.
Mitigation
Access to the listen port of the pathfinder TCP encapsulation service should be limited to trustworthy networks or peers.
Remediation
Phoenix Contact strongly recommends upgrading affected mGuard devices to firmware version 8.9.3 / 10.4.1 or higher which fix this vulnerability.
CERT@VDE coordinated with Phoenix Contact