Phoenix Contact: Unbounded growth of the session cache in TCP encapsulation service in FL MGUARD 2xxx and 4xxx firmware
The OpenSSL library in FL MGUARD 2102, 2105, 4302, 4305, 4102 PCIE, and 4102 PCI firmware (version 10.5.0) contains a vulnerability in the TLSv1.3 implementation that causes unbounded growth of the session cache in the TCP encapsulation service. This memory leak can eventually exhaust device memory, rendering the firewall unresponsive and disrupting network traffic to connected OT devices. The issue is present in OpenSSL 3.0.0 and later versions used by these products. Phoenix Contact has released firmware version 10.6.0 to address this issue and recommends using Pathfinder as an alternative to TCP encapsulation.
- Network access to the TCP encapsulation service port on the mGuard device
- TCP encapsulation feature enabled on the target mGuard device
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2042bebf-9c6e-4b57-90bd-4ac6c256a9beGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.