PHOENIX CONTACT: Denial-of-Service vulnerability in mGuard product family
A denial-of-service vulnerability in the HTTPS management interface of Phoenix Contact mGuard devices can be triggered by a large number of unauthenticated connection attempts originating from different source IP addresses. An attacker can exhaust device resources and make the management interface unavailable. The vulnerability affects FL MGUARD and TC MGUARD devices in multiple form factors and configurations running firmware versions prior to 8.9.0. Standard firewall connection limits cannot prevent this issue. The vulnerability is resolved in firmware version 8.9.0.
- Network access to the HTTPS management interface (port 443)
- Ability to originate connections from multiple source IP addresses
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/4789c952-8c53-414b-ab69-040178fe4a5dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.