Share: Email | Twitter

ID

VDE-2024-039

Published

2024-09-10 10:00 (CEST)

Last update

2024-09-10 08:35 (CEST)

Vendor(s)

PHOENIX CONTACT GmbH & Co. KG

Product(s)

Article No° Product Name Affected Version(s)
FL MGUARD 2102 < 10.4.1
FL MGUARD 2105 < 10.4.1
FL MGUARD 4102 PCI < 10.4.1
FL MGUARD 4102 PCIE < 10.4.1
FL MGUARD 4302 < 10.4.1
FL MGUARD 4305 < 10.4.1
FL MGUARD CENTERPORT VPN-1000 < 8.9.3
FL MGUARD CORE TX < 8.9.3
FL MGUARD CORE TX VPN < 8.9.3
FL MGUARD DELTA TX/TX < 8.9.3
FL MGUARD DELTA TX/TX VPN < 8.9.3
FL MGUARD GT/GT < 8.9.3
FL MGUARD GT/GT VPN < 8.9.3
FL MGUARD PCI4000 < 8.9.3
FL MGUARD PCI4000 VPN < 8.9.3
FL MGUARD PCIE4000 < 8.9.3
FL MGUARD PCIE4000 VPN < 8.9.3
FL MGUARD RS2000 TX/TX-B < 8.9.3
FL MGUARD RS2000 TX/TX VPN < 8.9.3
FL MGUARD RS2005 TX VPN < 8.9.3
FL MGUARD RS4000 TX/TX < 8.9.3
FL MGUARD RS4000 TX/TX-M < 8.9.3
FL MGUARD RS4000 TX/TX-P < 8.9.3
FL MGUARD RS4000 TX/TX VPN < 8.9.3
FL MGUARD RS4004 TX/DTX < 8.9.3
FL MGUARD RS4004 TX/DTX VPN < 8.9.3
FL MGUARD SMART2 < 8.9.3
FL MGUARD SMART2 VPN < 8.9.3
TC MGUARD RS2000 3G VPN < 8.9.3
TC MGUARD RS2000 4G ATT VPN < 8.9.3
TC MGUARD RS2000 4G VPN < 8.9.3
TC MGUARD RS2000 4G VZW VPN < 8.9.3
TC MGUARD RS4000 3G VPN < 8.9.3
TC MGUARD RS4000 4G ATT VPN < 8.9.3
TC MGUARD RS4000 4G VPN < 8.9.3
TC MGUARD RS4000 4G VZW VPN < 8.9.3

Summary

Confidential data in HTTP query string of user requests. Incomplete sanitation of user input in administrative web interface.

CVE-2024-43392 only affects devices with firmware < 8.9.3.

Vulnerabilities



Last Update
Dec. 2, 2024, 11:19 a.m.
Weakness
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Summary

A low privileged remote attacker can read and write files as root due to improper neutralization of special elements in the variable EMAIL_RELAY_PASSWORD in mGuard devices.

Last Update
Dec. 2, 2024, 11:19 a.m.
Weakness
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Summary

A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of special elements in the variable EMAIL_NOTIFICATION.TO in mGuard devices.

Last Update
Dec. 2, 2024, 11:19 a.m.
Weakness
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Summary

A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of special elements in the variable PROXY_HTTP_PORT in mGuard devices.

Last Update
Dec. 2, 2024, 11:19 a.m.
Weakness
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Summary

An low privileged remote attacker can execute OS commands with root privileges due to improper neutralization of special elements in user data.

Last Update
Dec. 2, 2024, 11:19 a.m.
Weakness
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') (CWE-74)
Summary

A low privileged remote attacker with write permissions can reconfigure the SNMP service due to improper input validation.

Last Update
Dec. 2, 2024, 11:18 a.m.
Weakness
Improper Removal of Sensitive Information Before Storage or Transfer (CWE-212)
Summary

A low privileged remote attacker can gain the root password due to improper removal of sensitive information before storage or transfer.

Last Update
Dec. 2, 2024, 11:19 a.m.
Weakness
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') (CWE-74)
Summary

A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_PORTFORWARDING.SRC_IP environment variable which can lead to a DoS.

Last Update
Dec. 2, 2024, 11:19 a.m.
Weakness
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') (CWE-74)
Summary

A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_INCOMING.FROM_IP FW_INCOMING.IN_IP FW_OUTGOING.FROM_IP FW_OUTGOING.IN_IP FW_RULESETS.FROM_IP FW_RULESETS.IN_IP environment variable which can lead to a DoS.

Last Update
Dec. 2, 2024, 11:19 a.m.
Weakness
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') (CWE-74)
Summary

A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_INCOMING.FROM_IP FW_INCOMING.IN_IP FW_OUTGOING.FROM_IP FW_OUTGOING.IN_IP environment variable which can lead to a DoS.

Last Update
Dec. 2, 2024, 11:19 a.m.
Weakness
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') (CWE-74)
Summary

A low privileged remote attacker can perform configuration changes of the firewall services, including packet forwarding or NAT through the FW_NAT.IN_IP environment variable which can lead to a DoS.

Last Update
Dec. 2, 2024, 11:19 a.m.
Weakness
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') (CWE-74)
Summary

A low privileged remote attacker can perform configuration changes of the ospf service through OSPF_INTERFACE.SIMPLE_KEY, OSPF_INTERFACE.DIGEST_KEY environment variables which can lead to a DoS.

Last Update
Dec. 2, 2024, 11:19 a.m.
Weakness
Improper Removal of Sensitive Information Before Storage or Transfer (CWE-212)
Summary

A low privileged remote attacker can get access to CSRF tokens of higher privileged users which can be abused to mount CSRF attacks.

Impact

Attackers can gain knowledge of confidential user data. Attackers can escalate their privileges on the system. Attackers can trigger covert misbehavior within several services.

Solution

Mitigation

Access to the administrative interfaces should be granted only to trustworthy users.

Remediation

Phoenix Contact strongly recommends upgrading affected mGuard devices to firmware version 8.9.3 / 10.4.1 or higher which fixes these vulnerabilities.

CVE-2024-43392 only affects devices with firmware < 8.9.3.

Reported by

CERT@VDE coordinated with Phoenix Contact

These vulnerabilities were discovered by Andrea Palanca from Nozomi Networks Security Research Team.