PHOENIX CONTACT, Innominate Security Technologies mGuard Firmware
A null pointer dereference vulnerability in Phoenix Contact mGuard firmware versions 8.0.0 through 8.5.1 allows an unauthenticated remote attacker to cause a denial of service by sending a crafted network packet. The affected mGuard devices are network security appliances (firewalls and VPN gateways) deployed in industrial control system environments to protect communications and remote access. When the device crashes, it loses all filtering and encryption functions, disrupting industrial traffic and cutting off remote supervisory access until manual restart. No firmware patch is available; the vulnerability affects 24 product variants across the TC, FL, and DIN-rail mGuard lines.
- Network access to the mGuard device on its management or monitored network interface
- No authentication required
- Ability to craft and send network packets to the device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/611d4e9f-b6c0-4966-a8ca-6851d1fee6bf