Summary
The FL MGUARD family of devices is affected by two vulnerabilities.
Impact
CVE-2022-4304: The OpenSSL library contains a bug that leads to a timing oracle when RSA based ciphers are used without forward secrecy for network communication. By sending a very large number of trial messages, an attacker can try to achieve a decryption of encrypted network packets. This affects TLS connections to and from the FL MGUARD as well as VPN connections. The highest risk arises from deferred attempts to decrypt pre-recorded network sessions. The throttling feature of the FL MGUARD can impede but not prevent the attack.There is a risk that attackers could decrypt network traffic encrypted by the FL MGUARD device.
CVE-2023-2673: If a FL MGUARD or TC MGUARD device is operated in static or autodetect stealth mode, UDP packets which are directed to the protected device do not pass the configured MAC filter rules. The issue does not compromise the incoming IPv4 packet filter, which blocks all incoming traffic by default. The issue does not affect multi stealth mode.There is a risk that attackers could send UDP packets to the protected device which should have been filtered out.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
1357872 | FL MGUARD 2102 | Firmware <=10.1.1 |
1441187 | FL MGUARD 4102 PCI | Firmware <=10.1.1 |
1357842 | FL MGUARD 4102 PCIE | Firmware <=10.1.1 |
1357840 | FL MGUARD 4302 | Firmware <=10.1.1 |
2702547 | FL MGUARD CENTERPORT | Firmware <=8.9.0 |
2702820 | FL MGUARD CENTERPORT VPN-1000 | Firmware <=8.9.0 |
2702884 | FL MGUARD CORE TX | Firmware <=8.9.0 |
2702831 | FL MGUARD CORE TX VPN | Firmware <=8.9.0 |
2700967 | FL MGUARD DELTA TX/TX | Firmware <=8.9.0 |
2700968 | FL MGUARD DELTA TX/TX VPN | Firmware <=8.9.0 |
2700197 | FL MGUARD GT/GT | Firmware <=8.9.0 |
2700198 | FL MGUARD GT/GT VPN | Firmware <=8.9.0 |
2701274 | FL MGUARD PCI4000 | Firmware <=8.9.0 |
2701275 | FL MGUARD PCI4000 VPN | Firmware <=8.9.0 |
2701277 | FL MGUARD PCIE4000 | Firmware <=8.9.0 |
2701278 | FL MGUARD PCIE4000 VPN | Firmware <=8.9.0 |
2700642 | FL MGUARD RS2000 TX/TX VPN | Firmware <=8.9.0 |
2702139 | FL MGUARD RS2000 TX/TX-B | Firmware <=8.9.0 |
2701875 | FL MGUARD RS2005 TX VPN | Firmware <=8.9.0 |
2700634, 2200515 | FL MGUARD RS4000 TX/TX VPN | Firmware <=8.9.0 |
2702470 | FL MGUARD RS4000 TX/TX-M | Firmware <=8.9.0 |
2702259 | FL MGUARD RS4000 TX/TX-P | Firmware <=8.9.0 |
2701876 | FL MGUARD RS4004 TX/DTX | Firmware <=8.9.0 |
2701877 | FL MGUARD RS4004 TX/DTX VPN | Firmware <=8.9.0 |
2700640 | FL MGUARD SMART2 | Firmware <=8.9.0 |
2700639 | FL MGUARD SMART2 VPN | Firmware <=8.9.0 |
Vulnerabilities
Expand / Collapse allA timing based side channel exists in the OpenSSL RSA Decryption implementation
which could be sufficient to recover a plaintext across a network in a
Bleichenbacher style attack. To achieve a successful decryption an attacker
would have to be able to send a very large number of trial messages for
decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5,
RSA-OEAP and RSASVE.
For example, in a TLS connection, RSA is commonly used by a client to send an
encrypted pre-master secret to the server. An attacker that had observed a
genuine connection between a client and a server could use this flaw to send
trial messages to the server and record the time taken to process them. After a
sufficiently large number of messages the attacker could recover the pre-master
secret used for the original connection and thus be able to decrypt the
application data sent over that connection.
Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allow UDP packets to bypass the filter rules and access the solely connected device behind the MGUARD which can be used for flooding attacks.
Mitigation
Do not use RSA based ciphers for encryption of network traffic, use cipher suites with forward secrecy for TLS or IPsec communication and renew vulnerable certificates frequently.
Configure the incoming IPv4 packet filter carefully to protect clients from potentially malicious UDP packets.
Remediation
The vulnerabilities are fixed in firmware versions 8.9.1 and 10.2.0.
We strongly recommend all affected FL MGUARD users to upgrade to this or a later version.
Revision History
Version | Date | Summary |
---|---|---|
1 | 13.06.2023 08:00 | Initial revision. |
2 | 14.05.2025 15:00 | Fix: added distribution |