PHOENIX CONTACT: FL MGUARD, TC MGUARD, TC ROUTER and TC CLOUD CLIENT: PPPD vulnerable to CVE-2020-8597
FL MGUARD, TC MGUARD, TC ROUTER, and TC CLOUD CLIENT devices are affected by a buffer overflow vulnerability (CVE-2020-8597) in the PPP (Point-to-Point Protocol) service. The vulnerability allows malicious PPP peers to send specially crafted packets that trigger a buffer overflow, potentially leading to arbitrary code execution. The PPP service is disabled by default on most FL MGUARD models but is active by default on TC ROUTER and TC CLOUD CLIENT devices. It also activates automatically on FL MGUARD and TC MGUARD devices when configured for mobile data connections, router modem mode, router PPPoE mode, or L2TP over IPsec tunneling. All affected product variants running firmware versions below the minimum patched versions are vulnerable.
- PPP service must be active (enabled by default in TC ROUTER and TC CLOUD CLIENT; enabled in FL MGUARD/TC MGUARD only in mobile data, router modem mode, router PPPoE mode, or L2TP over IPsec configurations)
- Network connectivity to the device on the PPP interface or connection path
Patching may require device reboot — plan for process interruption
/api/v1/advisories/74d8743f-9ccd-4c30-946d-821cd93a38fe