Summary
Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling.
For the mGuard Device Manager only the mdm Installer for Windows is affected.
Impact
Attackers with network access to the Apache web server can download and therefore read mGuard configuration profiles ('ATV profiles'). Such configuration profiles may contain sensitive information, e.g., private keys associated with IPsec VPN connections.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
2981974 | FL MGUARD DM UNLIMITED | Firmware <=1.13.0.1 |
Vulnerabilities
Expand / Collapse allApache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling
Mitigation
This vulnerability is exploitable only if the ConfigPull functionality is used and config files are stored unencrypted. As a best practice and mitigation measure, we recommend storing configuration files encrypted with the device specific public key of the mGuard appliances.
Remediation
PHOENIX CONTACT strongly recommends upgrading FL MGUARD DM UNLIMITED to version 1.13.0.2 or higher, which fixes this vulnerability.
Revision History
Version | Date | Summary |
---|---|---|
1 | 12.04.2022 08:00 | Initial revision. |
2 | 22.05.2025 15:03 | Fix: added distribution, quotation mark |