PHOENIX CONTACT: FL MGUARD affected by two vulnerabilities
The FL MGUARD family of devices is affected by two vulnerabilities: one allowing potential decryption of communications encrypted with RSA-based ciphers due to cryptographic weaknesses (CWE-1287), and another allowing malicious UDP packets to reach clients if the incoming IPv4 packet filter is not properly configured (CWE-203). These vulnerabilities affect all models including the newer 4000-series (2102, 4102, 4302) and the older series (CENTERPORT, CORE TX, DELTA TX, GT, PCI4000, PCIE4000, RS2000, RS2005, RS4000, RS4004, SMART2) with various configurations (standard, PCI, PCIE, VPN-enabled).
- Network access to the FL MGUARD device
- Device configured to use RSA-based ciphers for TLS or IPsec encryption
- Incoming IPv4 packet filter not properly configured to block malicious UDP traffic
Patching may require device reboot — plan for process interruption
/api/v1/advisories/557f0c00-ce19-42ff-98a2-c2f4ae7eb755Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.