Summary
Confidential data in HTTP query string of user requests.
Incomplete sanitation of user input in administrative web interface.
Impact
Attackers can gain knowledge of confidential user data.
Attackers can escalate their privileges on the system.
Attackers can trigger covert misbehavior within several services.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
1357828 | FL MGUARD 2102 | Firmware <10.4.1 |
1357850 | FL MGUARD 2105 | Firmware <10.4.1 |
1441187 | FL MGUARD 4102 PCI | Firmware <10.4.1 |
1357842 | FL MGUARD 4102 PCIE | Firmware <10.4.1 |
1357840 | FL MGUARD 4302 | Firmware <10.4.1 |
1357875 | FL MGUARD 4305 | Firmware <10.4.1 |
2702547 | FL MGUARD CENTERPORT | Firmware <8.9.3 |
2702820 | FL MGUARD CENTERPORT VPN-1000 | Firmware <8.9.3 |
2702884 | FL MGUARD CORE TX | Firmware <8.9.3 |
2702831 | FL MGUARD CORE TX VPN | Firmware <8.9.3 |
2700967 | FL MGUARD DELTA TX/TX | Firmware <8.9.3 |
2700968 | FL MGUARD DELTA TX/TX VPN | Firmware <8.9.3 |
2700197 | FL MGUARD GT/GT | Firmware <8.9.3 |
2700198 | FL MGUARD GT/GT VPN | Firmware <8.9.3 |
2701274 | FL MGUARD PCI4000 | Firmware <8.9.3 |
2701275 | FL MGUARD PCI4000 VPN | Firmware <8.9.3 |
2701277 | FL MGUARD PCIE4000 | Firmware <8.9.3 |
2701278 | FL MGUARD PCIE4000 VPN | Firmware <8.9.3 |
2700642 | FL MGUARD RS2000 TX/TX VPN | Firmware <8.9.3 |
2702139 | FL MGUARD RS2000 TX/TX-B | Firmware <8.9.3 |
2701875 | FL MGUARD RS2005 TX VPN | Firmware <8.9.3 |
2700634 | FL MGUARD RS4000 TX/TX | Firmware <8.9.3 |
2200515 | FL MGUARD RS4000 TX/TX VPN | Firmware <8.9.3 |
2702470 | FL MGUARD RS4000 TX/TX-M | Firmware <8.9.3 |
2702259 | FL MGUARD RS4000 TX/TX-P | Firmware <8.9.3 |
2701876 | FL MGUARD RS4004 TX/DTX | Firmware <8.9.3 |
2701877 | FL MGUARD RS4004 TX/DTX VPN | Firmware <8.9.3 |
2700640 | FL MGUARD SMART2 | Firmware <8.9.3 |
2700639 | FL MGUARD SMART2 VPN | Firmware <8.9.3 |
2903441 | TC MGUARD RS2000 3G VPN | Firmware <8.9.3 |
1010464 | TC MGUARD RS2000 4G ATT VPN | Firmware <8.9.3 |
2903588 | TC MGUARD RS2000 4G VPN | Firmware <8.9.3 |
1010462 | TC MGUARD RS2000 4G VZW VPN | Firmware <8.9.3 |
2903440 | TC MGUARD RS4000 3G VPN | Firmware <8.9.3 |
1010463 | TC MGUARD RS4000 4G ATT VPN | Firmware <8.9.3 |
2903586 | TC MGUARD RS4000 4G VPN | Firmware <8.9.3 |
1010461 | TC MGUARD RS4000 4G VZW VPN | Firmware <8.9.3 |
Vulnerabilities
Expand / Collapse allA low privileged remote attacker with write permissions can reconfigure the SNMP service due to improper input validation.
A low privileged remote attacker can read and write files as root due to improper neutralization of special elements in the
variable EMAIL_RELAY_PASSWORD in mGuard devices.
A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of
special elements in the variable EMAIL_NOTIFICATION.TO in mGuard devices.
A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of
special elements in the variable PROXY_HTTP_PORT in mGuard devices
An low privileged remote attacker can execute OS commands with root privileges due to improper neutralization of special
elements in user data.
A low privileged remote attacker can gain the root password due to improper removal of sensitive information before storage or
transfer.
A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet
forwarding, network access control or NAT through the FW_INCOMING.FROM_IP FW_INCOMING.IN_IP
FW_OUTGOING.FROM_IP FW_OUTGOING.IN_IP FW_RULESETS.FROM_IP FW_RULESETS.IN_IP environment variable
which can lead to a DoS.
A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet
forwarding, network access control or NAT through the FW_INCOMING.FROM_IP FW_INCOMING.IN_IP
FW_OUTGOING.FROM_IP FW_OUTGOING.IN_IP environment variable which can lead to a DoS.
A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet
forwarding, network access control or NAT through the FW_PORTFORWARDING.SRC_IP environment variable which can lead
to a DoS.
A low privileged remote attacker can perform configuration changes of the firewall services, including packet forwarding or NAT
through the FW_NAT.IN_IP environment variable which can lead to a DoS.
A low privileged remote attacker can perform configuration changes of the ospf service through
OSPF_INTERFACE.SIMPLE_KEY, OSPF_INTERFACE.DIGEST_KEY environment variables which can lead to a DoS.
A low privileged remote attacker can get access to CSRF tokens of higher privileged users which can be abused to mount CSRF
attacks.
Mitigation
Access to the administrative interfaces should be granted only to trustworthy users.
Remediation
Phoenix Contact strongly recommends upgrading affected mGuard devices to firmware version 8.9.3 / 10.4.1 or higher which fixes these vulnerabilities.
Revision History
Version | Date | Summary |
---|---|---|
1.0.0 | 10.09.2024 12:00 | Initial revision. |
1.0.1 | 06.11.2024 12:27 | Fix: correct certvde domain, added self-reference |
1.0.2 | 10.04.2025 15:00 | Fixed csaf reference URL |
1.1.2 | 27.08.2025 12:00 | Update: CWE from CVE-2024-43388, CVE-2024-43389, CVE-2024-43390, CVE-2024-43391, CVE-2024-43392, CVE-2024-43393, CVE-2024-7698, Revision History |