Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-5441 (GCVE-0-2018-5441)
Vulnerability from cvelistv5 – Published: 2018-01-30 20:00 – Updated: 2024-08-05 05:33| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | PHOENIX CONTACT mGuard |
Affected:
PHOENIX CONTACT mGuard
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T05:33:44.317Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "102907",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/102907"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-030-01"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2018-001"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "PHOENIX CONTACT mGuard",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "PHOENIX CONTACT mGuard"
}
]
}
],
"datePublic": "2018-01-30T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmware versions 7.2 to 8.6.0. mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-354",
"description": "CWE-354",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-05-16T13:57:02.000Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"name": "102907",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/102907"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-030-01"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2018-001"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2018-5441",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "PHOENIX CONTACT mGuard",
"version": {
"version_data": [
{
"version_value": "PHOENIX CONTACT mGuard"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmware versions 7.2 to 8.6.0. mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-354"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "102907",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102907"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-030-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-030-01"
},
{
"name": "https://cert.vde.com/en-us/advisories/vde-2018-001",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2018-001"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2018-5441",
"datePublished": "2018-01-30T20:00:00.000Z",
"dateReserved": "2018-01-12T00:00:00.000Z",
"dateUpdated": "2024-08-05T05:33:44.317Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2018-5441\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2018-01-30T20:29:00.457\",\"lastModified\":\"2024-11-21T04:08:48.653\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmware versions 7.2 to 8.6.0. mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema de validaci\u00f3n indebida de valores de comprobaci\u00f3n de integridad en PHOENIX CONTACT mGuard, en versiones de firmware 7.2 a 8.6.0. Los dispositivos mGuard dependen de sumas de verificaci\u00f3n internas para verificar la integridad interna de los paquetes de actualizaci\u00f3n. La verificaci\u00f3n podr\u00eda no realizarse siempre correctamente, lo que permite que un atacante modifique paquetes de actualizaci\u00f3n de firmware.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-354\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_centerport_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"6005AE8C-7CB3-41FA-9ECB-9C9037B48893\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_centerport:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"324613AE-C9FA-47FA-8FB1-E76134C7CBED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_delta_tx\\\\/tx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"C8A6BEE0-43D0-4A12-9C3A-116984C4DEB4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_delta_tx\\\\/tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59B2643C-0EC5-4AD5-B535-C2222E7AE406\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_delta_tx\\\\/tx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"2D71D1E8-F9B2-44C9-B15A-0C42C18F25A7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_delta_tx\\\\/tx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B6CE71E-5CDF-45F6-AD09-B03A750250C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_gt\\\\/gt_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"E0D32CBD-BF58-4CC6-A325-A7A3508D8656\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_gt\\\\/gt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C1E4D97-BCEC-4F1D-8B40-B24B1ECA439E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_gt\\\\/gt_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"718DC9CE-3519-4733-801C-17A882185CAF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_gt\\\\/gt_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92A92F7A-EE80-4323-825C-27E9089CA633\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_pci4000_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"797F0C72-8189-4EC5-BBF0-07E266446AA7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_pci4000_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8220FE6A-E74D-4FFC-82BA-22F3016F146C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_pcie4000_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"C60E7710-91B8-4B15-A16B-9F6668195F85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_pcie4000_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5A3F679-0067-471F-B46B-CDB16089E93C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_rs2000_tx\\\\/tx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"0EE290F1-F7D4-46D1-AE4F-377BC5D212D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_rs2000_tx\\\\/tx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DDD6DBE-D9B1-415D-8284-1BE8D786ED24\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_rs2000_tx\\\\/tx-b_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"3985BB8B-EB08-47EE-B34D-1FA86B4411F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_rs2000_tx\\\\/tx-b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F50ABE1-5FAB-426C-8F16-95A9E52FFBC8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_rs2005_tx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"60530BD0-E190-4C01-92BB-12F048C46758\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_rs2005_tx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F31A6108-2E06-43F7-AB8A-4D1A76D8ADEF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_rs4000_tx\\\\/tx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"4C67B81A-CE29-43B4-994E-ED4AF3C14457\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_rs4000_tx\\\\/tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDB26D7E-DE57-486E-965A-7B018B9ED58B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_rs4000_tx\\\\/tx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"2ED72FD3-7A3B-4102-9B96-465EBEF93914\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_rs4000_tx\\\\/tx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5193E597-3C65-49F6-BBE2-C164F89AB188\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_rs4000_tx\\\\/tx_vpn-m_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"9F541618-C97E-4DA2-AB39-7AEE81D00574\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_rs4000_tx\\\\/tx_vpn-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4566E57B-1E44-425E-8D88-36C1201A9E5C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_rs4000_tx\\\\/tx-p_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"1D226957-05AF-4DDA-8C8D-CC2E956196EF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_rs4000_tx\\\\/tx-p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A3E45AC-5FD2-457E-A004-6C07CEDAD306\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_rs4004_tx\\\\/dtx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"041DD89B-AF3A-4EE7-B3DC-0DA007262ECC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_rs4004_tx\\\\/dtx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EFE74BB-0167-4484-AE87-F17A55829844\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_rs4004_tx\\\\/dtx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"038962DC-3D92-44B7-A003-38B34E0ACB94\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_rs4004_tx\\\\/dtx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4473C338-9A25-4FD5-8736-4072D0FA265E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_smart2_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"E9C65B2C-DCDF-4822-B2EC-0ACE339FB821\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_smart2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B2EDFA2-FE87-4B6E-8380-AD6F66A3EA09\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_smart2_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"065D3E69-85D2-4193-9F45-6AEF09B9AA99\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_smart2_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2799FB2-FA17-4C7F-91B7-F6A06055E657\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_rs2000_3g_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"8DA40CB1-6FDB-47C2-BA72-69B9C90B3797\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_rs2000_3g_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D3A13E-0C0D-4073-AE22-5D96F43B3B81\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_rs4000_3g_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"392CB8FC-CCBD-48D4-97D8-8B532864BBFF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_rs4000_3g_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DA558DA-2590-42B0-BFE8-BCC590B6E9AC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_core_tx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"6CE9BBFB-FA4D-4368-978A-974784B05884\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_core_tx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F4B73EB-D000-4BD9-BEA2-AAC6A01600FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_rs2000_4g_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"F21C1837-5C64-43E6-AEDC-29B6D44C4EEA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_rs2000_4g_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E805FC49-F621-4552-B5F7-BEF2C9CE4CEC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0\",\"versionEndIncluding\":\"8.6.0\",\"matchCriteriaId\":\"3125CAB7-ECEA-4FB7-9B2A-F2C25F29EE03\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:mguard_rs4000_4g_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34CB4439-3EEA-40A1-A2AE-3594A8DB7AA3\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/102907\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2018-001\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-18-030-01\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/102907\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2018-001\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-18-030-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}"
}
}
GSD-2018-5441
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2018-5441",
"description": "An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmware versions 7.2 to 8.6.0. mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages.",
"id": "GSD-2018-5441"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-5441"
],
"details": "An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmware versions 7.2 to 8.6.0. mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages.",
"id": "GSD-2018-5441",
"modified": "2023-12-13T01:22:40.375609Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2018-5441",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "PHOENIX CONTACT mGuard",
"version": {
"version_data": [
{
"version_value": "PHOENIX CONTACT mGuard"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmware versions 7.2 to 8.6.0. mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-354"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "102907",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/102907"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-030-01",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-030-01"
},
{
"name": "https://cert.vde.com/en-us/advisories/vde-2018-001",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2018-001"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_centerport_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_centerport:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_delta_tx\\/tx_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_delta_tx\\/tx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_delta_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_delta_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_gt\\/gt_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_gt\\/gt:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_gt\\/gt_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_gt\\/gt_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_pci4000_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_pci4000_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_pcie4000_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_pcie4000_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs2000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs2000_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs2000_tx\\/tx-b_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs2000_tx\\/tx-b:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs2005_tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs2005_tx_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs4000_tx\\/tx_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs4000_tx\\/tx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs4000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs4000_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs4000_tx\\/tx_vpn-m_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs4000_tx\\/tx_vpn-m:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs4000_tx\\/tx-p_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs4000_tx\\/tx-p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs4004_tx\\/dtx_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs4004_tx\\/dtx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs4004_tx\\/dtx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs4004_tx\\/dtx_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_smart2_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_smart2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_smart2_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_smart2_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs2000_3g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs2000_3g_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs4000_3g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs4000_3g_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_core_tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_core_tx_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs2000_4g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs2000_4g_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:mguard_rs4000_4g_vpn:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "ics-cert@hq.dhs.gov",
"ID": "CVE-2018-5441"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmware versions 7.2 to 8.6.0. mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-030-01",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-030-01"
},
{
"name": "102907",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/102907"
},
{
"name": "https://cert.vde.com/en-us/advisories/vde-2018-001",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2018-001"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2019-10-09T23:41Z",
"publishedDate": "2018-01-30T20:29Z"
}
}
}
CNVD-2018-02344
Vulnerability from cnvd - Published: 2018-01-31用户可联系供应商获得补丁信息: http://www.phoenixcontact.net/qr/2702547/firmware_update
| Name | PHOENIX CONTACT mGuard >=7.2,<=8.6.0 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2018-5441"
}
},
"description": "Phoenix Contact mGuard\u662fPhoenix Contact\u7684\u4e00\u6b3e\u4fdd\u62a4\u7cfb\u7edf\u7684\u672a\u6388\u6743\u8bbf\u95ee\u548c\u5b89\u88c5\u7684\u5b89\u5168\u8bbe\u5907\u3002 \r\n\r\nPHOENIX CONTACT mGuard\u5b58\u5728\u672a\u6388\u6743\u4fee\u6539\u6f0f\u6d1e\uff0cmGuard\u8bbe\u5907\u4f9d\u9760\u5185\u90e8\u6821\u9a8c\u66f4\u65b0\u5305\u5b8c\u6574\u6027\uff0c\u7531\u4e8e\u9a8c\u8bc1\u65e0\u6cd5\u59cb\u7ec8\u6b63\u786e\u6267\u884c\uff0c\u5bfc\u81f4\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u4fee\u6539\u56fa\u4ef6\u66f4\u65b0\u5305\u3002",
"discovererName": "PHOENIX CONTACT",
"formalWay": "\u7528\u6237\u53ef\u8054\u7cfb\u4f9b\u5e94\u5546\u83b7\u5f97\u8865\u4e01\u4fe1\u606f\uff1a\r\nhttp://www.phoenixcontact.net/qr/2702547/firmware_update",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-02344",
"openTime": "2018-01-31",
"patchDescription": "Phoenix Contact mGuard\u662fPhoenix Contact\u7684\u4e00\u6b3e\u4fdd\u62a4\u7cfb\u7edf\u7684\u672a\u6388\u6743\u8bbf\u95ee\u548c\u5b89\u88c5\u7684\u5b89\u5168\u8bbe\u5907\u3002 \r\n\r\nPHOENIX CONTACT mGuard\u5b58\u5728\u672a\u6388\u6743\u4fee\u6539\u6f0f\u6d1e\uff0cmGuard\u8bbe\u5907\u4f9d\u9760\u5185\u90e8\u6821\u9a8c\u66f4\u65b0\u5305\u5b8c\u6574\u6027\uff0c\u7531\u4e8e\u9a8c\u8bc1\u65e0\u6cd5\u59cb\u7ec8\u6b63\u786e\u6267\u884c\uff0c\u5bfc\u81f4\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u4fee\u6539\u56fa\u4ef6\u66f4\u65b0\u5305\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "PHOENIX CONTACT mGuard\u672a\u6388\u6743\u4fee\u6539\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "PHOENIX CONTACT mGuard \u003e=7.2\uff0c\u003c=8.6.0"
},
"referenceLink": "https://ics-cert.us-cert.gov/advisories/ICSA-18-030-01",
"serverity": "\u9ad8",
"submitTime": "2018-01-31",
"title": "PHOENIX CONTACT mGuard\u672a\u6388\u6743\u4fee\u6539\u6f0f\u6d1e"
}
GHSA-XGQM-F6FC-576H
Vulnerability from github – Published: 2022-05-13 01:32 – Updated: 2022-05-13 01:32An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmware versions 7.2 to 8.6.0. mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages.
{
"affected": [],
"aliases": [
"CVE-2018-5441"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2018-01-30T20:29:00Z",
"severity": "HIGH"
},
"details": "An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmware versions 7.2 to 8.6.0. mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages.",
"id": "GHSA-xgqm-f6fc-576h",
"modified": "2022-05-13T01:32:10Z",
"published": "2022-05-13T01:32:10Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-5441"
},
{
"type": "WEB",
"url": "https://cert.vde.com/en-us/advisories/vde-2018-001"
},
{
"type": "WEB",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-030-01"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/102907"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
VAR-201801-1492
Vulnerability from variot - Updated: 2024-11-23 22:45An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmware versions 7.2 to 8.6.0. mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages. PHOENIX CONTACT mGuard The firmware contains a vulnerability related to input validation.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. \302\240Phoenix Contact mGuard is a security device for unauthorized access and installation of Phoenix Contact's protection system. PHOENIX CONTACT mGuard has unauthorized modification of the vulnerability. Successful exploits will allow local attackers to bypass certain security restrictions. Other attacks are also possible
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201801-1492",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "mguard rs4000 tx\\/tx",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs2000 4g vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard smart2 vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs4004 tx\\/dtx vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs4000 tx\\/tx vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard pci4000 vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs2000 3g vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard pcie4000 vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs2000 tx\\/tx vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard delta tx\\/tx vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard delta tx\\/tx",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard centerport",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs2000 tx\\/tx-b",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs2005 tx vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard gt\\/gt vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs4000 tx\\/tx vpn-m",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs4000 3g vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs4000 tx\\/tx-p",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs4000 4g vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs4000 tx\\/tx",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs2000 4g vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs2000 3g vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard core tx vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard smart2",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard smart2 vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs4004 tx\\/dtx",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard smart2",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs2005 tx vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard gt\\/gt",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard delta tx\\/tx",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard centerport",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard pci4000 vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs4000 tx\\/tx vpn-m",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs4004 tx\\/dtx",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs4000 tx\\/tx-p",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard core tx vpn",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard rs2000 tx\\/tx vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs4004 tx\\/dtx vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs4000 tx\\/tx vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard pcie4000 vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard gt\\/gt",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "7.2.0"
},
{
"model": "mguard delta tx\\/tx vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs2000 tx\\/tx-b",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs4000 4g vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard rs4000 3g vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard gt\\/gt vpn",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "8.6.0"
},
{
"model": "mguard centerport",
"scope": null,
"trust": 0.8,
"vendor": "phoenix contact",
"version": null
},
{
"model": "mguard core tx vpn",
"scope": null,
"trust": 0.8,
"vendor": "phoenix contact",
"version": null
},
{
"model": "mguard delta tx/tx",
"scope": null,
"trust": 0.8,
"vendor": "phoenix contact",
"version": null
},
{
"model": "mguard gt/gt",
"scope": null,
"trust": 0.8,
"vendor": "phoenix contact",
"version": null
},
{
"model": "mguard pci4000 vpn",
"scope": null,
"trust": 0.8,
"vendor": "phoenix contact",
"version": null
},
{
"model": "mguard rs2000 tx/tx vpn",
"scope": null,
"trust": 0.8,
"vendor": "phoenix contact",
"version": null
},
{
"model": "mguard smart2",
"scope": null,
"trust": 0.8,
"vendor": "phoenix contact",
"version": null
},
{
"model": "contact mguard",
"scope": "gte",
"trust": 0.6,
"vendor": "phoenix",
"version": "7.2\u003c=8.6.0"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.6"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.5.0"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.4.2"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.4.1"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.4.0"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.3.0"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "7.2"
},
{
"model": "contact mguard",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.6.1"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard centerport",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs2005 tx vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs4000 tx tx",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs4000 tx tx vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs4000 tx tx vpn m",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs4000 tx tx p",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs4004 tx dtx",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs4004 tx dtx vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard smart2",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard smart2 vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs2000 3g vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard delta tx tx",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs4000 3g vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard core tx vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs2000 4g vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs4000 4g vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard delta tx tx vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard gt gt",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard gt gt vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard pci4000 vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard pcie4000 vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs2000 tx tx vpn",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard rs2000 tx tx b",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-02344"
},
{
"db": "BID",
"id": "102907"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001896"
},
{
"db": "NVD",
"id": "CVE-2018-5441"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:phoenixcontact:mguard_centerport_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:phoenixcontact:mguard_core_tx_vpn_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:phoenixcontact:mguard_delta_tx%2Ftx_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:phoenixcontact:mguard_gt%2Fgt_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:phoenixcontact:mguard_pci4000_vpn_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:phoenixcontact:mguard_rs2000_tx%2Ftx_vpn_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:phoenixcontact:mguard_smart2_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-001896"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "PHOENIX CONTACT",
"sources": [
{
"db": "BID",
"id": "102907"
}
],
"trust": 0.3
},
"cve": "CVE-2018-5441",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2018-5441",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CNVD-2018-02344",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2018-5441",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2018-5441",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2018-5441",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2018-02344",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201801-1078",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "IVD",
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1",
"trust": 0.2,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-02344"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001896"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1078"
},
{
"db": "NVD",
"id": "CVE-2018-5441"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmware versions 7.2 to 8.6.0. mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages. PHOENIX CONTACT mGuard The firmware contains a vulnerability related to input validation.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. \\302\\240Phoenix Contact mGuard is a security device for unauthorized access and installation of Phoenix Contact\u0027s protection system. PHOENIX CONTACT mGuard has unauthorized modification of the vulnerability. \nSuccessful exploits will allow local attackers to bypass certain security restrictions. Other attacks are also possible",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-5441"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001896"
},
{
"db": "CNVD",
"id": "CNVD-2018-02344"
},
{
"db": "BID",
"id": "102907"
},
{
"db": "IVD",
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-5441",
"trust": 3.5
},
{
"db": "ICS CERT",
"id": "ICSA-18-030-01",
"trust": 3.3
},
{
"db": "BID",
"id": "102907",
"trust": 1.9
},
{
"db": "CERT@VDE",
"id": "VDE-2018-001",
"trust": 1.6
},
{
"db": "CNVD",
"id": "CNVD-2018-02344",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1078",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001896",
"trust": 0.8
},
{
"db": "IVD",
"id": "E2E32A81-39AB-11E9-AA47-000C29342CB1",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-02344"
},
{
"db": "BID",
"id": "102907"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001896"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1078"
},
{
"db": "NVD",
"id": "CVE-2018-5441"
}
]
},
"id": "VAR-201801-1492",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-02344"
}
],
"trust": 1.5
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-02344"
}
]
},
"last_update_date": "2024-11-23T22:45:27.240000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.phoenixcontact.com/online/portal/pc"
},
{
"title": "PHOENIX CONTACT mGuard is not authorized to modify the patch for the vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/115091"
},
{
"title": "PHOENIX CONTACT mGuard Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=78155"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-02344"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001896"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1078"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.8
},
{
"problemtype": "CWE-354",
"trust": 1.0
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-001896"
},
{
"db": "NVD",
"id": "CVE-2018-5441"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.3,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-030-01"
},
{
"trust": 2.2,
"url": "http://www.securityfocus.com/bid/102907"
},
{
"trust": 1.6,
"url": "https://cert.vde.com/en-us/advisories/vde-2018-001"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-5441"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-5441"
},
{
"trust": 0.3,
"url": "https://www.phoenixcontact.com/online/portal/pc"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-02344"
},
{
"db": "BID",
"id": "102907"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001896"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1078"
},
{
"db": "NVD",
"id": "CVE-2018-5441"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-02344"
},
{
"db": "BID",
"id": "102907"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-001896"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1078"
},
{
"db": "NVD",
"id": "CVE-2018-5441"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-01-31T00:00:00",
"db": "IVD",
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1"
},
{
"date": "2018-01-31T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-02344"
},
{
"date": "2018-01-30T00:00:00",
"db": "BID",
"id": "102907"
},
{
"date": "2018-03-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-001896"
},
{
"date": "2018-01-31T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201801-1078"
},
{
"date": "2018-01-30T20:29:00.457000",
"db": "NVD",
"id": "CVE-2018-5441"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-01-31T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-02344"
},
{
"date": "2018-01-30T00:00:00",
"db": "BID",
"id": "102907"
},
{
"date": "2018-03-15T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-001896"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201801-1078"
},
{
"date": "2024-11-21T04:08:48.653000",
"db": "NVD",
"id": "CVE-2018-5441"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "102907"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1078"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "PHOENIX CONTACT mGuard Vulnerability related to input validation in firmware",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-001896"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Input validation error",
"sources": [
{
"db": "IVD",
"id": "e2e32a81-39ab-11e9-aa47-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201801-1078"
}
],
"trust": 0.8
}
}
ICSA-18-030-01
Vulnerability from csaf_cisa - Published: 2018-01-30 00:00 - Updated: 2018-01-30 00:00{
"document": {
"acknowledgments": [
{
"organization": "PHOENIX CONTACT",
"summary": "reporting to CERT@VDE that their products are affected"
},
{
"organization": "CERT@VDE",
"summary": "coordinating this vulnerability with NCCIC"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "ATTENTION: Low skill level to exploit.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Communications, Critical Manufacturing, Information Technology",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "NCCIC recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet; Locate control system networks and remote devices behind firewalls, and isolate them from the business network; When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available in the NCCIC Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "other",
"text": "No known public exploits specifically target this vulnerability. This vulnerability is not remotely exploitable.",
"title": "Exploitability"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-18-030-01 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsa-18-030-01.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-18-030-01 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-030-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/"
}
],
"title": "PHOENIX CONTACT mGuard",
"tracking": {
"current_release_date": "2018-01-30T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-18-030-01",
"initial_release_date": "2018-01-30T00:00:00.000000Z",
"revision_history": [
{
"date": "2018-01-30T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-18-030-01 PHOENIX CONTACT mGuard"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= 7.2 | \u003c= 8.6.0",
"product": {
"name": "mGuard firmware: versions 7.2 to 8.6.0",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "mGuard firmware"
}
],
"category": "vendor",
"name": "PHOENIX CONTACT, Innominate Security Technologies"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-5441",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"notes": [
{
"category": "summary",
"text": "mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages. CVE-2018-5441 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-5441"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "MGUARD CENTERPORT",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2702547/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD DELTA TX/TX",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2700967/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD DELTA TX/TX VPN",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2700968/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD GT/GT",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2700197/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD GT/GT VPN",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2700198/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD PCI4000 VPN",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2701275/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD PCIE4000 VPN",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2701278/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD RS2000 TX/TX VPN",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2700642/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD RS2000 TX/TX-B",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2702139/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD RS2005 TX VPN",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2701875/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD RS4000 TX/TX",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2700634/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD RS4000 TX/TX VPN",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2200515/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD RS4000 TX/TX VPN-M",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2702465/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD RS4000 TX/TX-P",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2702259/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD RS4004 TX/DTX",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2701876/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD RS4004 TX/DTX VPN",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2701877/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD SMART2",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2700640/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD SMART2 VPN",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2700639/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD RS2000 3G VPN",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2903441/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD RS4000 3G VPN",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2903440/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD CORE TX VPN",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2700640/firmware_update%20"
},
{
"category": "mitigation",
"details": "MGUARD RS2000 4G VPN",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2903588/firmware_update"
},
{
"category": "mitigation",
"details": "MGUARD RS4000 4G VPN",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2903586/firmware_update"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
}
]
}
FKIE_CVE-2018-5441
Vulnerability from fkie_nvd - Published: 2018-01-30 20:29 - Updated: 2024-11-21 04:08| URL | Tags | ||
|---|---|---|---|
| ics-cert@hq.dhs.gov | http://www.securityfocus.com/bid/102907 | Third Party Advisory, VDB Entry | |
| ics-cert@hq.dhs.gov | https://cert.vde.com/en-us/advisories/vde-2018-001 | Patch, Third Party Advisory | |
| ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-030-01 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/102907 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en-us/advisories/vde-2018-001 | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-030-01 | Third Party Advisory, US Government Resource |
| Vendor | Product | Version | |
|---|---|---|---|
| phoenixcontact | mguard_centerport_firmware | * | |
| phoenixcontact | mguard_centerport | - | |
| phoenixcontact | mguard_delta_tx\/tx_firmware | * | |
| phoenixcontact | mguard_delta_tx\/tx | - | |
| phoenixcontact | mguard_delta_tx\/tx_vpn_firmware | * | |
| phoenixcontact | mguard_delta_tx\/tx_vpn | - | |
| phoenixcontact | mguard_gt\/gt_firmware | * | |
| phoenixcontact | mguard_gt\/gt | - | |
| phoenixcontact | mguard_gt\/gt_vpn_firmware | * | |
| phoenixcontact | mguard_gt\/gt_vpn | - | |
| phoenixcontact | mguard_pci4000_vpn_firmware | * | |
| phoenixcontact | mguard_pci4000_vpn | - | |
| phoenixcontact | mguard_pcie4000_vpn_firmware | * | |
| phoenixcontact | mguard_pcie4000_vpn | - | |
| phoenixcontact | mguard_rs2000_tx\/tx_vpn_firmware | * | |
| phoenixcontact | mguard_rs2000_tx\/tx_vpn | - | |
| phoenixcontact | mguard_rs2000_tx\/tx-b_firmware | * | |
| phoenixcontact | mguard_rs2000_tx\/tx-b | - | |
| phoenixcontact | mguard_rs2005_tx_vpn_firmware | * | |
| phoenixcontact | mguard_rs2005_tx_vpn | - | |
| phoenixcontact | mguard_rs4000_tx\/tx_firmware | * | |
| phoenixcontact | mguard_rs4000_tx\/tx | - | |
| phoenixcontact | mguard_rs4000_tx\/tx_vpn_firmware | * | |
| phoenixcontact | mguard_rs4000_tx\/tx_vpn | - | |
| phoenixcontact | mguard_rs4000_tx\/tx_vpn-m_firmware | * | |
| phoenixcontact | mguard_rs4000_tx\/tx_vpn-m | - | |
| phoenixcontact | mguard_rs4000_tx\/tx-p_firmware | * | |
| phoenixcontact | mguard_rs4000_tx\/tx-p | - | |
| phoenixcontact | mguard_rs4004_tx\/dtx_firmware | * | |
| phoenixcontact | mguard_rs4004_tx\/dtx | - | |
| phoenixcontact | mguard_rs4004_tx\/dtx_vpn_firmware | * | |
| phoenixcontact | mguard_rs4004_tx\/dtx_vpn | - | |
| phoenixcontact | mguard_smart2_firmware | * | |
| phoenixcontact | mguard_smart2 | - | |
| phoenixcontact | mguard_smart2_vpn_firmware | * | |
| phoenixcontact | mguard_smart2_vpn | - | |
| phoenixcontact | mguard_rs2000_3g_vpn_firmware | * | |
| phoenixcontact | mguard_rs2000_3g_vpn | - | |
| phoenixcontact | mguard_rs4000_3g_vpn_firmware | * | |
| phoenixcontact | mguard_rs4000_3g_vpn | - | |
| phoenixcontact | mguard_core_tx_vpn_firmware | * | |
| phoenixcontact | mguard_core_tx_vpn | - | |
| phoenixcontact | mguard_rs2000_4g_vpn_firmware | * | |
| phoenixcontact | mguard_rs2000_4g_vpn | - | |
| phoenixcontact | mguard_rs4000_4g_vpn_firmware | * | |
| phoenixcontact | mguard_rs4000_4g_vpn | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_centerport_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6005AE8C-7CB3-41FA-9ECB-9C9037B48893",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_centerport:-:*:*:*:*:*:*:*",
"matchCriteriaId": "324613AE-C9FA-47FA-8FB1-E76134C7CBED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_delta_tx\\/tx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A6BEE0-43D0-4A12-9C3A-116984C4DEB4",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_delta_tx\\/tx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59B2643C-0EC5-4AD5-B535-C2222E7AE406",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_delta_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2D71D1E8-F9B2-44C9-B15A-0C42C18F25A7",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_delta_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B6CE71E-5CDF-45F6-AD09-B03A750250C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_gt\\/gt_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E0D32CBD-BF58-4CC6-A325-A7A3508D8656",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_gt\\/gt:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8C1E4D97-BCEC-4F1D-8B40-B24B1ECA439E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_gt\\/gt_vpn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "718DC9CE-3519-4733-801C-17A882185CAF",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_gt\\/gt_vpn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "92A92F7A-EE80-4323-825C-27E9089CA633",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_pci4000_vpn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "797F0C72-8189-4EC5-BBF0-07E266446AA7",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_pci4000_vpn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8220FE6A-E74D-4FFC-82BA-22F3016F146C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_pcie4000_vpn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C60E7710-91B8-4B15-A16B-9F6668195F85",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_pcie4000_vpn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5A3F679-0067-471F-B46B-CDB16089E93C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_rs2000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0EE290F1-F7D4-46D1-AE4F-377BC5D212D9",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_rs2000_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5DDD6DBE-D9B1-415D-8284-1BE8D786ED24",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_rs2000_tx\\/tx-b_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3985BB8B-EB08-47EE-B34D-1FA86B4411F5",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_rs2000_tx\\/tx-b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F50ABE1-5FAB-426C-8F16-95A9E52FFBC8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_rs2005_tx_vpn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "60530BD0-E190-4C01-92BB-12F048C46758",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_rs2005_tx_vpn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F31A6108-2E06-43F7-AB8A-4D1A76D8ADEF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_rs4000_tx\\/tx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4C67B81A-CE29-43B4-994E-ED4AF3C14457",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_rs4000_tx\\/tx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDB26D7E-DE57-486E-965A-7B018B9ED58B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_rs4000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2ED72FD3-7A3B-4102-9B96-465EBEF93914",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_rs4000_tx\\/tx_vpn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5193E597-3C65-49F6-BBE2-C164F89AB188",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_rs4000_tx\\/tx_vpn-m_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F541618-C97E-4DA2-AB39-7AEE81D00574",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_rs4000_tx\\/tx_vpn-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4566E57B-1E44-425E-8D88-36C1201A9E5C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_rs4000_tx\\/tx-p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D226957-05AF-4DDA-8C8D-CC2E956196EF",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_rs4000_tx\\/tx-p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A3E45AC-5FD2-457E-A004-6C07CEDAD306",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_rs4004_tx\\/dtx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "041DD89B-AF3A-4EE7-B3DC-0DA007262ECC",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_rs4004_tx\\/dtx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0EFE74BB-0167-4484-AE87-F17A55829844",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_rs4004_tx\\/dtx_vpn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "038962DC-3D92-44B7-A003-38B34E0ACB94",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_rs4004_tx\\/dtx_vpn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4473C338-9A25-4FD5-8736-4072D0FA265E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_smart2_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E9C65B2C-DCDF-4822-B2EC-0ACE339FB821",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_smart2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B2EDFA2-FE87-4B6E-8380-AD6F66A3EA09",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_smart2_vpn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "065D3E69-85D2-4193-9F45-6AEF09B9AA99",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_smart2_vpn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2799FB2-FA17-4C7F-91B7-F6A06055E657",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_rs2000_3g_vpn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8DA40CB1-6FDB-47C2-BA72-69B9C90B3797",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_rs2000_3g_vpn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "02D3A13E-0C0D-4073-AE22-5D96F43B3B81",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_rs4000_3g_vpn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "392CB8FC-CCBD-48D4-97D8-8B532864BBFF",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_rs4000_3g_vpn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DA558DA-2590-42B0-BFE8-BCC590B6E9AC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_core_tx_vpn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6CE9BBFB-FA4D-4368-978A-974784B05884",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_core_tx_vpn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F4B73EB-D000-4BD9-BEA2-AAC6A01600FE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_rs2000_4g_vpn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F21C1837-5C64-43E6-AEDC-29B6D44C4EEA",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_rs2000_4g_vpn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E805FC49-F621-4552-B5F7-BEF2C9CE4CEC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3125CAB7-ECEA-4FB7-9B2A-F2C25F29EE03",
"versionEndIncluding": "8.6.0",
"versionStartIncluding": "7.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:mguard_rs4000_4g_vpn:-:*:*:*:*:*:*:*",
"matchCriteriaId": "34CB4439-3EEA-40A1-A2AE-3594A8DB7AA3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmware versions 7.2 to 8.6.0. mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages."
},
{
"lang": "es",
"value": "Se ha descubierto un problema de validaci\u00f3n indebida de valores de comprobaci\u00f3n de integridad en PHOENIX CONTACT mGuard, en versiones de firmware 7.2 a 8.6.0. Los dispositivos mGuard dependen de sumas de verificaci\u00f3n internas para verificar la integridad interna de los paquetes de actualizaci\u00f3n. La verificaci\u00f3n podr\u00eda no realizarse siempre correctamente, lo que permite que un atacante modifique paquetes de actualizaci\u00f3n de firmware."
}
],
"id": "CVE-2018-5441",
"lastModified": "2024-11-21T04:08:48.653",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-01-30T20:29:00.457",
"references": [
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/102907"
},
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2018-001"
},
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-030-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/102907"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2018-001"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-030-01"
}
],
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-354"
}
],
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
VDE-2018-001
Vulnerability from csaf_phoenixcontactgmbhcokg - Published: 2018-01-30 09:00 - Updated: 2025-05-14 12:28An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmware versions 7.2 to 8.6.0. mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages.
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "The integrity of the mGuard firmware atomic update process cannot be guaranteed under all circumstances.\n\nThe mGuard atomic update mechanism relies on internal checksums for the integrity verification of some portions of the update packages. The verification of these internal checksums may not always be performed correctly.",
"title": "Summary"
},
{
"category": "description",
"text": "The mGuard only allows the installation of firmware updates digitally signed by Phoenix Contact (Innominate). The atomic update mechanism that was introduced with mGuard 7.2.0 to support the current generation of devices relies on internal checksums for the verification of the internal integrity of some portions of the update packages. As the verification may not always be performed correctly, an attacker might modify firmware update packages.\n\nThis vulnerability is present in all mGuard releases since 7.2.0 on the listed devices but does not affect the current mGuard 8.6.1 release.\n\nFirmware images used to completely flash the device are not affected by this vulnerability.",
"title": "Impact"
},
{
"category": "description",
"text": "We strongly advise all mGuard users to upgrade to the firmware version 8.6.1.\n\nAlso affected are discontinued mGuard products from PHOENIX CONTACT and Innominate AG running firmware version 7.2.0 or above.\n\n| Article N\u00b0 | Model | Download Link |\n|------------|--------------------------------|-------------------|\n| 2702547 | FL MGUARD CENTERPORT | https://www.phoenixcontact.com/de-de/produkte/security-router-ohne-tragschienen-montage-fl-mguard-centerport-2702547?type=firmware_update |\n| 2700967 | FL MGUARD DELTA TX/TX | https://www.phoenixcontact.com/de-de/produkte/security-router-ohne-tragschienen-montage-fl-mguard-delta-txtx-2700967?type=firmware_update |\n| 2700968 | FL MGUARD DELTA TX/TX VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-ohne-tragschienen-montage-fl-mguard-delta-txtx-vpn-2700968?type=firmware_update |\n| 2700197 | FL MGUARD GT/GT | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-gtgt-2700197?type=firmware_update |\n| 2700198 | FL MGUARD GT/GT VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-gtgt-vpn-2700198?type=firmware_update |\n| 2701275 | FL MGUARD PCI4000 VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-ohne-tragschienen-montage-fl-mguard-pci4000-vpn-2701275?type=firmware_update |\n| 2701278 | FL MGUARD PCIE4000 VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-ohne-tragschienen-montage-fl-mguard-pcie4000-vpn-2701278?type=firmware_update |\n| 2700642 | FL MGUARD RS2000 TX/TX VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-rs2000-txtx-vpn-2700642?type=firmware_update |\n| 2702139 | FL MGUARD RS2000 TX/TX-B | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-rs2000-txtx-b-2702139?type=firmware_update |\n| 2701875 | FL MGUARD RS2005 TX VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-rs2005-tx-vpn-2701875?type=firmware_update |\n| 2700634 | FL MGUARD RS4000 TX/TX | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-rs4000-txtx-2700634?type=firmware_update |\n| 2200515 | FL MGUARD RS4000 TX/TX VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-rs4000-txtx-vpn-2200515?type=firmware_update |\n| 2702465 | FL MGUARD RS4000 TX/TX VPN-M | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-rs4000-txtx-vpn-m-2702465?type=firmware_update |\n| 2702259 | FL MGUARD RS4000 TX/TX-P | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-rs4000-txtx-p-2702259?type=firmware_update |\n| 2701876 | FL MGUARD RS4004 TX/DTX | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-rs4004-txdtx-2701876?type=firmware_update |\n| 2701877 | FL MGUARD RS4004 TX/DTX VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-rs4004-txdtx-vpn-2701877?type=firmware_update |\n| 2700640 | FL MGUARD SMART2 | https://www.phoenixcontact.com/de-de/produkte/security-router-ohne-tragschienen-montage-fl-mguard-smart2-2700640?type=firmware_update |\n| 2700639 | FL MGUARD SMART2 VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-ohne-tragschienen-montage-fl-mguard-smart2-vpn-2700639?type=firmware_update |\n| 2903441 | TC MGUARD RS2000 3G VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-tc-mguard-rs2000-3g-vpn-2903441?type=firmware_update |\n| 2903440 | TC MGUARD RS4000 3G VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-tc-mguard-rs4000-3g-vpn-2903440?type=firmware_update |\n| 2702831 | FL MGUARD CORE TX VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-ohne-tragschienen-montage-fl-mguard-smart2-2700640?type=firmware_update |\n| 2903588 | TC MGUARD RS2000 4G VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-tc-mguard-rs2000-4g-vpn-2903588?type=firmware_update |\n| 2903586 | TC MGUARD RS4000 4G VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-tc-mguard-rs4000-4g-vpn-2903586?type=firmware_update |",
"title": "Remediation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@phoenixcontact.com",
"name": "Phoenix Contact GmbH \u0026 Co. KG",
"namespace": "https://phoenixcontact.com/psirt"
},
"references": [
{
"category": "self",
"summary": "VDE-2018-001: PHOENIX CONTACT: Advisory for mGuard products - HTML",
"url": "https://certvde.com/de/advisories/VDE-2018-001/"
},
{
"category": "external",
"summary": "CERT@VDE Security Advisories for PHOENIX CONTACT",
"url": "https://certvde.com/de/advisories/vendor/phoenixcontact/"
},
{
"category": "self",
"summary": "VDE-2018-001: PHOENIX CONTACT: Advisory for mGuard products - CSAF",
"url": "https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2018/vde-2018-001.json"
}
],
"title": "PHOENIX CONTACT: Advisory for mGuard products",
"tracking": {
"aliases": [
"VDE-2018-001"
],
"current_release_date": "2025-05-14T12:28:19.000Z",
"generator": {
"date": "2025-01-15T12:32:01.472Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.16"
}
},
"id": "VDE-2018-001",
"initial_release_date": "2018-01-30T09:00:00.000Z",
"revision_history": [
{
"date": "2018-01-30T09:00:00.000Z",
"number": "1",
"summary": "Initial revision."
},
{
"date": "2025-01-15T11:00:00.000Z",
"number": "2",
"summary": "update publisher details"
},
{
"date": "2025-05-14T12:28:19.000Z",
"number": "3",
"summary": "Fix: version space, firmware category, added distribution"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "7.2\u003c=8.6.0",
"product": {
"name": "Software 7.2\u003c=8.6.0",
"product_id": "CSAFPID-21024"
}
},
{
"category": "product_version",
"name": "8.6.1",
"product": {
"name": "Software 8.6.1",
"product_id": "CSAFPID-22025"
}
}
],
"category": "product_family",
"name": "Software"
},
{
"branches": [
{
"category": "product_name",
"name": "FL MGUARD CENTERPORT",
"product": {
"name": "FL MGUARD CENTERPORT",
"product_id": "CSAFPID-11001",
"product_identification_helper": {
"serial_numbers": [
"2702547"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD CORE TX VPN",
"product": {
"name": "FL MGUARD CORE TX VPN",
"product_id": "CSAFPID-11002",
"product_identification_helper": {
"serial_numbers": [
"2702831"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD DELTA TX/TX",
"product": {
"name": "FL MGUARD DELTA TX/TX",
"product_id": "CSAFPID-11003",
"product_identification_helper": {
"serial_numbers": [
"2700967"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD DELTA TX/TX VPN",
"product": {
"name": "FL MGUARD DELTA TX/TX VPN",
"product_id": "CSAFPID-11004",
"product_identification_helper": {
"serial_numbers": [
"2700968"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD GT/GT",
"product": {
"name": "FL MGUARD GT/GT",
"product_id": "CSAFPID-11005",
"product_identification_helper": {
"serial_numbers": [
"2700197"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD GT/GT VPN",
"product": {
"name": "FL MGUARD GT/GT VPN",
"product_id": "CSAFPID-11006",
"product_identification_helper": {
"serial_numbers": [
"2700198"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD PCI4000 VPN",
"product": {
"name": "FL MGUARD PCI4000 VPN",
"product_id": "CSAFPID-11007",
"product_identification_helper": {
"serial_numbers": [
"2701275"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD PCIE4000 VPN",
"product": {
"name": "FL MGUARD PCIE4000 VPN",
"product_id": "CSAFPID-11008",
"product_identification_helper": {
"serial_numbers": [
"2701278"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD RS2000 3G VPN",
"product": {
"name": "FL MGUARD RS2000 3G VPN",
"product_id": "CSAFPID-11009",
"product_identification_helper": {
"serial_numbers": [
"2903441"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD RS2000 4G VPN",
"product": {
"name": "FL MGUARD RS2000 4G VPN",
"product_id": "CSAFPID-11010",
"product_identification_helper": {
"serial_numbers": [
"2903588"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD RS2000 TX/TX-B",
"product": {
"name": "FL MGUARD RS2000 TX/TX-B",
"product_id": "CSAFPID-11011",
"product_identification_helper": {
"serial_numbers": [
"2702139"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD RS2000 TX/TX VPN",
"product": {
"name": "FL MGUARD RS2000 TX/TX VPN",
"product_id": "CSAFPID-11012",
"product_identification_helper": {
"serial_numbers": [
"2700642"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD RS2005 TX VPN",
"product": {
"name": "FL MGUARD RS2005 TX VPN",
"product_id": "CSAFPID-11013",
"product_identification_helper": {
"serial_numbers": [
"2701875"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD RS4000 3G VPN",
"product": {
"name": "FL MGUARD RS4000 3G VPN",
"product_id": "CSAFPID-11014",
"product_identification_helper": {
"serial_numbers": [
"2903440"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD RS4000 4G VPN",
"product": {
"name": "FL MGUARD RS4000 4G VPN",
"product_id": "CSAFPID-11015",
"product_identification_helper": {
"serial_numbers": [
"2903586"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD RS4000 TX/TX",
"product": {
"name": "FL MGUARD RS4000 TX/TX",
"product_id": "CSAFPID-11016",
"product_identification_helper": {
"serial_numbers": [
"2700634"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD RS4000 TX/TX-P",
"product": {
"name": "FL MGUARD RS4000 TX/TX-P",
"product_id": "CSAFPID-11017",
"product_identification_helper": {
"serial_numbers": [
"2702259"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD RS4000 TX/TX VPN",
"product": {
"name": "FL MGUARD RS4000 TX/TX VPN",
"product_id": "CSAFPID-11018",
"product_identification_helper": {
"serial_numbers": [
"2200515"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD RS4000 TX/TX VPN-M",
"product": {
"name": "FL MGUARD RS4000 TX/TX VPN-M",
"product_id": "CSAFPID-11019",
"product_identification_helper": {
"serial_numbers": [
"2702465"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD RS4004 TX/DTX",
"product": {
"name": "FL MGUARD RS4004 TX/DTX",
"product_id": "CSAFPID-11020",
"product_identification_helper": {
"serial_numbers": [
"2701876"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD RS4004 TX/DTX VPN",
"product": {
"name": "FL MGUARD RS4004 TX/DTX VPN",
"product_id": "CSAFPID-11021",
"product_identification_helper": {
"serial_numbers": [
"2701877"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD SMART2",
"product": {
"name": "FL MGUARD SMART2",
"product_id": "CSAFPID-11022",
"product_identification_helper": {
"serial_numbers": [
"2700640"
]
}
}
},
{
"category": "product_name",
"name": "FL MGUARD SMART2 VPN",
"product": {
"name": "FL MGUARD SMART2 VPN",
"product_id": "CSAFPID-11023",
"product_identification_helper": {
"serial_numbers": [
"2700639"
]
}
}
}
],
"category": "product_family",
"name": "Hardware"
}
],
"category": "vendor",
"name": "PHOENIX CONTACT"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021",
"CSAFPID-31022",
"CSAFPID-31023"
],
"summary": "Affected products."
},
{
"group_id": "CSAFGID-0002",
"product_ids": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010",
"CSAFPID-32011",
"CSAFPID-32012",
"CSAFPID-32013",
"CSAFPID-32014",
"CSAFPID-32015",
"CSAFPID-32016",
"CSAFPID-32017",
"CSAFPID-32018",
"CSAFPID-32019",
"CSAFPID-32020",
"CSAFPID-32021",
"CSAFPID-32022",
"CSAFPID-32023"
],
"summary": "Fixed products."
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD CENTERPORT",
"product_id": "CSAFPID-31001"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD CORE TX VPN",
"product_id": "CSAFPID-31002"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD DELTA TX/TX",
"product_id": "CSAFPID-31003"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD DELTA TX/TX VPN",
"product_id": "CSAFPID-31004"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD GT/GT",
"product_id": "CSAFPID-31005"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11005"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD GT/GT VPN",
"product_id": "CSAFPID-31006"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11006"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD PCI4000 VPN",
"product_id": "CSAFPID-31007"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11007"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD PCIE4000 VPN",
"product_id": "CSAFPID-31008"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11008"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD RS2000 3G VPN",
"product_id": "CSAFPID-31009"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11009"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD RS2000 4G VPN",
"product_id": "CSAFPID-31010"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11010"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD RS2000 TX/TX-B",
"product_id": "CSAFPID-31011"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11011"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD RS2000 TX/TX VPN",
"product_id": "CSAFPID-31012"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11012"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD RS2005 TX VPN",
"product_id": "CSAFPID-31013"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11013"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD RS4000 3G VPN",
"product_id": "CSAFPID-31014"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11014"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD RS4000 4G VPN",
"product_id": "CSAFPID-31015"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11015"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD RS4000 TX/TX",
"product_id": "CSAFPID-31016"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11016"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD RS4000 TX/TX-P",
"product_id": "CSAFPID-31017"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11017"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD RS4000 TX/TX VPN",
"product_id": "CSAFPID-31018"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11018"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD RS4000 TX/TX VPN-M",
"product_id": "CSAFPID-31019"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11019"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD RS4004 TX/DTX",
"product_id": "CSAFPID-31020"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11020"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD RS4004 TX/DTX VPN",
"product_id": "CSAFPID-31021"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11021"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD SMART2",
"product_id": "CSAFPID-31022"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11022"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 7.2\u003c=8.6.0 installed on FL MGUARD SMART2 VPN",
"product_id": "CSAFPID-31023"
},
"product_reference": "CSAFPID-21024",
"relates_to_product_reference": "CSAFPID-11023"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD CENTERPORT",
"product_id": "CSAFPID-32001"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD CORE TX VPN",
"product_id": "CSAFPID-32002"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD DELTA TX/TX",
"product_id": "CSAFPID-32003"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD DELTA TX/TX VPN",
"product_id": "CSAFPID-32004"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD GT/GT",
"product_id": "CSAFPID-32005"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11005"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD GT/GT VPN",
"product_id": "CSAFPID-32006"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11006"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD PCI4000 VPN",
"product_id": "CSAFPID-32007"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11007"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD PCIE4000 VPN",
"product_id": "CSAFPID-32008"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11008"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD RS2000 3G VPN",
"product_id": "CSAFPID-32009"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11009"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD RS2000 4G VPN",
"product_id": "CSAFPID-32010"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11010"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD RS2000 TX/TX-B",
"product_id": "CSAFPID-32011"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11011"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD RS2000 TX/TX VPN",
"product_id": "CSAFPID-32012"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11012"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD RS2005 TX VPN",
"product_id": "CSAFPID-32013"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11013"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD RS4000 3G VPN",
"product_id": "CSAFPID-32014"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11014"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD RS4000 4G VPN",
"product_id": "CSAFPID-32015"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11015"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD RS4000 TX/TX",
"product_id": "CSAFPID-32016"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11016"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD RS4000 TX/TX-P",
"product_id": "CSAFPID-32017"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11017"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD RS4000 TX/TX VPN",
"product_id": "CSAFPID-32018"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11018"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD RS4000 TX/TX VPN-M",
"product_id": "CSAFPID-32019"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11019"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD RS4004 TX/DTX",
"product_id": "CSAFPID-32020"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11020"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD RS4004 TX/DTX VPN",
"product_id": "CSAFPID-32021"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11021"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD SMART2",
"product_id": "CSAFPID-32022"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11022"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Software 8.6.1 installed on FL MGUARD SMART2 VPN",
"product_id": "CSAFPID-32023"
},
"product_reference": "CSAFPID-22025",
"relates_to_product_reference": "CSAFPID-11023"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-5441",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "description",
"text": "An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmware versions 7.2 to 8.6.0. mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010",
"CSAFPID-32011",
"CSAFPID-32012",
"CSAFPID-32013",
"CSAFPID-32014",
"CSAFPID-32015",
"CSAFPID-32016",
"CSAFPID-32017",
"CSAFPID-32018",
"CSAFPID-32019",
"CSAFPID-32020",
"CSAFPID-32021",
"CSAFPID-32022",
"CSAFPID-32023"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021",
"CSAFPID-31022",
"CSAFPID-31023"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "We strongly advise all mGuard users to upgrade to the firmware version 8.6.1.\n\nAlso affected are discontinued mGuard products from PHOENIX CONTACT and Innominate AG running firmware version 7.2.0 or above.\n\n| Article N\u00b0 | Model | Download Link |\n|------------|--------------------------------|-------------------|\n| 2702547 | FL MGUARD CENTERPORT | https://www.phoenixcontact.com/de-de/produkte/security-router-ohne-tragschienen-montage-fl-mguard-centerport-2702547?type=firmware_update |\n| 2700967 | FL MGUARD DELTA TX/TX | https://www.phoenixcontact.com/de-de/produkte/security-router-ohne-tragschienen-montage-fl-mguard-delta-txtx-2700967?type=firmware_update |\n| 2700968 | FL MGUARD DELTA TX/TX VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-ohne-tragschienen-montage-fl-mguard-delta-txtx-vpn-2700968?type=firmware_update |\n| 2700197 | FL MGUARD GT/GT | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-gtgt-2700197?type=firmware_update |\n| 2700198 | FL MGUARD GT/GT VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-gtgt-vpn-2700198?type=firmware_update |\n| 2701275 | FL MGUARD PCI4000 VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-ohne-tragschienen-montage-fl-mguard-pci4000-vpn-2701275?type=firmware_update |\n| 2701278 | FL MGUARD PCIE4000 VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-ohne-tragschienen-montage-fl-mguard-pcie4000-vpn-2701278?type=firmware_update |\n| 2700642 | FL MGUARD RS2000 TX/TX VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-rs2000-txtx-vpn-2700642?type=firmware_update |\n| 2702139 | FL MGUARD RS2000 TX/TX-B | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-rs2000-txtx-b-2702139?type=firmware_update |\n| 2701875 | FL MGUARD RS2005 TX VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-rs2005-tx-vpn-2701875?type=firmware_update |\n| 2700634 | FL MGUARD RS4000 TX/TX | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-rs4000-txtx-2700634?type=firmware_update |\n| 2200515 | FL MGUARD RS4000 TX/TX VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-rs4000-txtx-vpn-2200515?type=firmware_update |\n| 2702465 | FL MGUARD RS4000 TX/TX VPN-M | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-rs4000-txtx-vpn-m-2702465?type=firmware_update |\n| 2702259 | FL MGUARD RS4000 TX/TX-P | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-rs4000-txtx-p-2702259?type=firmware_update |\n| 2701876 | FL MGUARD RS4004 TX/DTX | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-rs4004-txdtx-2701876?type=firmware_update |\n| 2701877 | FL MGUARD RS4004 TX/DTX VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-fl-mguard-rs4004-txdtx-vpn-2701877?type=firmware_update |\n| 2700640 | FL MGUARD SMART2 | https://www.phoenixcontact.com/de-de/produkte/security-router-ohne-tragschienen-montage-fl-mguard-smart2-2700640?type=firmware_update |\n| 2700639 | FL MGUARD SMART2 VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-ohne-tragschienen-montage-fl-mguard-smart2-vpn-2700639?type=firmware_update |\n| 2903441 | TC MGUARD RS2000 3G VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-tc-mguard-rs2000-3g-vpn-2903441?type=firmware_update |\n| 2903440 | TC MGUARD RS4000 3G VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-tc-mguard-rs4000-3g-vpn-2903440?type=firmware_update |\n| 2702831 | FL MGUARD CORE TX VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-ohne-tragschienen-montage-fl-mguard-smart2-2700640?type=firmware_update |\n| 2903588 | TC MGUARD RS2000 4G VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-tc-mguard-rs2000-4g-vpn-2903588?type=firmware_update |\n| 2903586 | TC MGUARD RS4000 4G VPN | https://www.phoenixcontact.com/de-de/produkte/security-router-fuer-die-tragschiene-tc-mguard-rs4000-4g-vpn-2903586?type=firmware_update |",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021",
"CSAFPID-31022",
"CSAFPID-31023"
]
}
],
"title": "CVE-2018-5441"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.