PHOENIX CONTACT: Multiple products affected by possible infinite loop within OpenSSL library
FL MGUARD and TC MGUARD devices contain a possible infinite loop vulnerability in the OpenSSL library when parsing elliptic curve parameters in X.509 certificates. This affects certificate parsing used for HTTPS/SSH administrative login (when client certificates are configured), IPsec VPN peer certificate validation, and connections to external servers (OpenVPN, configuration pull, update servers). An attacker can send a specially crafted certificate to trigger a denial-of-service condition on the device. FL MGUARD DM UNLIMITED is also affected when parsing certificates in the Windows installer. FL WLAN 1010/1011/1100/1101/2010/2011/2100/2101 and FL WLAN 5100/5101/5102/5110/5111 devices are affected, with no planned fix available.
- Network access to reach the affected device on port 443 (HTTPS), port 22 (SSH), port 500/4500 (IPsec), or the configured management port
- The device must be configured to parse certificates (e.g., client certificate authentication enabled for admin login, or VPN peer certificate validation enabled)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6dac4a16-3c04-4e17-adb8-be1f2a30ef85