CVE-2023-2673
13.06.2023, 07:15
Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allowUDP packets to bypass the filter rules and access the solely connected device behind the MGUARD which can be used for flooding attacks.Enginsight
Vendor | Product | Version |
---|---|---|
phoenixcontact | fl_mguard_2102_firmware | 𝑥 ≤ 10.1.1 |
phoenixcontact | fl_mguard_4102_pci_firmware | 𝑥 ≤ 10.1.1 |
phoenixcontact | fl_mguard_4102_pcie_firmware | 𝑥 ≤ 10.1.1 |
phoenixcontact | fl_mguard_4302_firmware | 𝑥 ≤ 10.1.1 |
phoenixcontact | fl_mguard_centerport_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_centerport_vpn-1000_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_core_tx_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_core_tx_vpn_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_delta_tx\/tx_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_delta_tx\/tx_vpn_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_gt\/gt_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_gt\/gt_vpn_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_pci4000_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_pci4000_vpn_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_pcie4000_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_pcie4000_vpn_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_rs2000_tx\/tx-b_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_rs2000_tx\/tx_vpn_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_rs2005_tx_vpn_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_rs4000_tx\/tx-m_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_rs4000_tx\/tx-p_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_rs4000_tx\/tx_vpn_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_rs4004_tx\/dtx_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_rs4004_tx\/dtx_vpn_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_smart2_firmware | 𝑥 ≤ 8.9.0 |
phoenixcontact | fl_mguard_smart2_vpn_firmware | 𝑥 ≤ 8.9.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration