Zurück zur Übersicht

Phoenix Contact: Multiple Vulnerabilities in mGuard devices

VDE-2024-039
Last update
27.08.2025 12:00
Published at
10.09.2024 12:00
Vendor(s)
Phoenix Contact GmbH & Co. KG
External ID
VDE-2024-039
CSAF Document

Summary

Confidential data in HTTP query string of user requests.
Incomplete sanitation of user input in administrative web interface.

Impact

Attackers can gain knowledge of confidential user data.
Attackers can escalate their privileges on the system.
Attackers can trigger covert misbehavior within several services.

Affected Product(s)

Model no. Product name Affected versions
1357828 FL MGUARD 2102 Firmware <10.4.1
1357850 FL MGUARD 2105 Firmware <10.4.1
1441187 FL MGUARD 4102 PCI Firmware <10.4.1
1357842 FL MGUARD 4102 PCIE Firmware <10.4.1
1357840 FL MGUARD 4302 Firmware <10.4.1
1357875 FL MGUARD 4305 Firmware <10.4.1
2702547 FL MGUARD CENTERPORT Firmware <8.9.3
2702820 FL MGUARD CENTERPORT VPN-1000 Firmware <8.9.3
2702884 FL MGUARD CORE TX Firmware <8.9.3
2702831 FL MGUARD CORE TX VPN Firmware <8.9.3
2700967 FL MGUARD DELTA TX/TX Firmware <8.9.3
2700968 FL MGUARD DELTA TX/TX VPN Firmware <8.9.3
2700197 FL MGUARD GT/GT Firmware <8.9.3
2700198 FL MGUARD GT/GT VPN Firmware <8.9.3
2701274 FL MGUARD PCI4000 Firmware <8.9.3
2701275 FL MGUARD PCI4000 VPN Firmware <8.9.3
2701277 FL MGUARD PCIE4000 Firmware <8.9.3
2701278 FL MGUARD PCIE4000 VPN Firmware <8.9.3
2700642 FL MGUARD RS2000 TX/TX VPN Firmware <8.9.3
2702139 FL MGUARD RS2000 TX/TX-B Firmware <8.9.3
2701875 FL MGUARD RS2005 TX VPN Firmware <8.9.3
2700634 FL MGUARD RS4000 TX/TX Firmware <8.9.3
2200515 FL MGUARD RS4000 TX/TX VPN Firmware <8.9.3
2702470 FL MGUARD RS4000 TX/TX-M Firmware <8.9.3
2702259 FL MGUARD RS4000 TX/TX-P Firmware <8.9.3
2701876 FL MGUARD RS4004 TX/DTX Firmware <8.9.3
2701877 FL MGUARD RS4004 TX/DTX VPN Firmware <8.9.3
2700640 FL MGUARD SMART2 Firmware <8.9.3
2700639 FL MGUARD SMART2 VPN Firmware <8.9.3
2903441 TC MGUARD RS2000 3G VPN Firmware <8.9.3
1010464 TC MGUARD RS2000 4G ATT VPN Firmware <8.9.3
2903588 TC MGUARD RS2000 4G VPN Firmware <8.9.3
1010462 TC MGUARD RS2000 4G VZW VPN Firmware <8.9.3
2903440 TC MGUARD RS4000 3G VPN Firmware <8.9.3
1010463 TC MGUARD RS4000 4G ATT VPN Firmware <8.9.3
2903586 TC MGUARD RS4000 4G VPN Firmware <8.9.3
1010461 TC MGUARD RS4000 4G VZW VPN Firmware <8.9.3

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:57
Weakness
Improper Control of Generation of Code ('Code Injection') (CWE-94)
Summary

A low privileged remote attacker with write permissions can reconfigure the SNMP service due to improper input validation.

References

Published
22.09.2025 14:57
Weakness
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Summary

A low privileged remote attacker can read and write files as root due to improper neutralization of special elements in the
variable EMAIL_RELAY_PASSWORD in mGuard devices.

References

Published
22.09.2025 14:57
Weakness
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Summary

A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of
special elements in the variable EMAIL_NOTIFICATION.TO in mGuard devices.

References

Published
22.09.2025 14:57
Weakness
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Summary

A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of
special elements in the variable PROXY_HTTP_PORT in mGuard devices

References

Published
22.09.2025 14:57
Weakness
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Summary

An low privileged remote attacker can execute OS commands with root privileges due to improper neutralization of special
elements in user data.

References

Published
22.09.2025 14:57
Weakness
Improper Removal of Sensitive Information Before Storage or Transfer (CWE-212)
Summary

A low privileged remote attacker can gain the root password due to improper removal of sensitive information before storage or
transfer.

References

Published
22.09.2025 14:57
Weakness
Improper Control of Generation of Code ('Code Injection') (CWE-94)
Summary

A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet
forwarding, network access control or NAT through the FW_INCOMING.FROM_IP FW_INCOMING.IN_IP
FW_OUTGOING.FROM_IP FW_OUTGOING.IN_IP FW_RULESETS.FROM_IP FW_RULESETS.IN_IP environment variable
which can lead to a DoS.

References

Published
22.09.2025 14:57
Weakness
Improper Control of Generation of Code ('Code Injection') (CWE-94)
Summary

A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet
forwarding, network access control or NAT through the FW_INCOMING.FROM_IP FW_INCOMING.IN_IP
FW_OUTGOING.FROM_IP FW_OUTGOING.IN_IP environment variable which can lead to a DoS.

References

Published
22.09.2025 14:57
Weakness
Improper Control of Generation of Code ('Code Injection') (CWE-94)
Summary

A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet
forwarding, network access control or NAT through the FW_PORTFORWARDING.SRC_IP environment variable which can lead
to a DoS.

References

Published
22.09.2025 14:57
Weakness
Improper Control of Generation of Code ('Code Injection') (CWE-94)
Summary

A low privileged remote attacker can perform configuration changes of the firewall services, including packet forwarding or NAT
through the FW_NAT.IN_IP environment variable which can lead to a DoS.

References

Published
22.09.2025 14:57
Weakness
Improper Control of Generation of Code ('Code Injection') (CWE-94)
Summary

A low privileged remote attacker can perform configuration changes of the ospf service through
OSPF_INTERFACE.SIMPLE_KEY, OSPF_INTERFACE.DIGEST_KEY environment variables which can lead to a DoS.

References

Published
22.09.2025 14:57
Weakness
Insertion of Sensitive Information Into Sent Data (CWE-201)
Summary

A low privileged remote attacker can get access to CSRF tokens of higher privileged users which can be abused to mount CSRF
attacks.

References

Mitigation

Access to the administrative interfaces should be granted only to trustworthy users.

Remediation

Phoenix Contact strongly recommends upgrading affected mGuard devices to firmware version 8.9.3 / 10.4.1 or higher which fixes these vulnerabilities.

Revision History

Version Date Summary
1.0.0 10.09.2024 12:00 Initial revision.
1.0.1 06.11.2024 12:27 Fix: correct certvde domain, added self-reference
1.0.2 10.04.2025 15:00 Fixed csaf reference URL
1.1.2 27.08.2025 12:00 Update: CWE from CVE-2024-43388, CVE-2024-43389, CVE-2024-43390, CVE-2024-43391, CVE-2024-43392, CVE-2024-43393, CVE-2024-7698, Revision History