PHOENIX CONTACT: XSS and memory-leak in FL MGUARD 1102/1105
FL MGUARD 1102 and 1105 contain two vulnerabilities: (1) stored cross-site scripting (XSS) in certificate file uploads on LDAP and Remote Logging settings pages—an authenticated admin user can embed malicious HTML/JavaScript that executes when other authenticated users view those pages; (2) memory leak in the remote logging function where syslog-ng data structures are not released, causing the device to gradually consume more memory and potentially become unavailable. Both issues are confirmed in firmware versions 1.4.0, 1.4.1, and 1.5.0. Phoenix Contact has released firmware version 1.5.1 that addresses both vulnerabilities. Workaround for the memory leak is to disable remote logging until the device can be patched.
- Valid FL MGUARD admin or super-admin credentials
- Access to the web-based management interface or REST API
- For XSS exploitation: another admin user must view the affected settings pages
Patching may require device reboot — plan for process interruption
/api/v1/advisories/088b40f5-b9f5-4e75-8d1a-5f760fc92d54