CVE-2024-7734 (GCVE-0-2024-7734)
Vulnerability from cvelistv5 – Published: 2024-09-10 08:03 – Updated: 2024-09-10 16:00
VLAI?
Title
Phoenix Contact: Multiple mGuard devices are vulnerable to a drain of open file descriptors.
Summary
An unauthenticated remote attacker can exploit the behavior of the pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to blocking of valid IPsec VPN peers.
Severity ?
5.3 (Medium)
CWE
- CWE-770 - Allocation of Resources Without Limits or Throttling
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:phoenixcontact:fl_mguard_centerport_vpn-1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx-b_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs2005_tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_smart2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_smart2_vpn_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "fl_mguard_smart2_vpn_firmware",
"vendor": "phoenixcontact",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:phoenixcontact:fl_mguard_2102_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_2105_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_4102_pcie_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_4102_pci_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_4302_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_mguard_4305_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "fl_mguard_4305_firmware",
"vendor": "phoenixcontact",
"versions": [
{
"lessThan": "10.4.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_3g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_3g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "tc_mguard_rs4000_4g_vzw_vpn_firmware",
"vendor": "phoenixcontact",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-7734",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-10T15:54:22.823770Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-10T16:00:45.691Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "FL MGUARD 2102",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "10.4.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD 2105",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "10.4.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD 4102 PCI",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "10.4.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD 4102 PCIE",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "10.4.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD 4302",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "10.4.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD 4305",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "10.4.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD CENTERPORT VPN-1000",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD CORE TX",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD CORE TX VPN",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD DELTA TX/TX",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD DELTA TX/TX VPN",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD GT/GT",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD GT/GT VPN",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD PCI4000",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD PCI4000 VPN",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD PCIE4000",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD PCIE4000 VPN",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD RS2000 TX/TX-B",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD RS2000 TX/TX VPN",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD RS2005 TX VPN",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD RS4000 TX/TX",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD RS4000 TX/TX-M",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD RS4000 TX/TX-P",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD RS4000 TX/TX VPN",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD RS4004 TX/DTX",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD RS4004 TX/DTX VPN",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD SMART2",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "FL MGUARD SMART2 VPN",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TC MGUARD RS2000 3G VPN",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TC MGUARD RS2000 4G ATT VPN",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TC MGUARD RS2000 4G VPN",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TC MGUARD RS2000 4G VZW VPN",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TC MGUARD RS4000 3G VPN",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TC MGUARD RS4000 4G ATT VPN",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TC MGUARD RS4000 4G VPN",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TC MGUARD RS4000 4G VZW VPN",
"vendor": "PHOENIX CONTACT",
"versions": [
{
"lessThan": "8.9.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An unauthenticated remote attacker can\u0026nbsp;exploit the behavior of the\u0026nbsp;pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to\u0026nbsp;blocking of valid IPsec VPN peers.\u003cbr\u003e"
}
],
"value": "An unauthenticated remote attacker can\u00a0exploit the behavior of the\u00a0pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to\u00a0blocking of valid IPsec VPN peers."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-770",
"description": "CWE-770 Allocation of Resources Without Limits or Throttling",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-10T08:03:19.477Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2024-052"
}
],
"source": {
"advisory": "VDE-2024-052",
"defect": [
"CERT@VDE#641676"
],
"discovery": "UNKNOWN"
},
"title": "Phoenix Contact: Multiple mGuard devices are vulnerable to a drain of open file descriptors.",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2024-7734",
"datePublished": "2024-09-10T08:03:19.477Z",
"dateReserved": "2024-08-13T12:52:12.930Z",
"dateUpdated": "2024-09-10T16:00:45.691Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-7734\",\"sourceIdentifier\":\"info@cert.vde.com\",\"published\":\"2024-09-10T08:15:04.020\",\"lastModified\":\"2024-09-28T23:56:32.053\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An unauthenticated remote attacker can\u00a0exploit the behavior of the\u00a0pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to\u00a0blocking of valid IPsec VPN peers.\"},{\"lang\":\"es\",\"value\":\"Un atacante remoto no autenticado puede explotar el comportamiento del servicio de encapsulaci\u00f3n TCP de Pathfinder estableciendo una gran cantidad de conexiones TCP con dicho servicio. El impacto se limita al bloqueo de pares VPN IPsec v\u00e1lidos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"CD02CC05-860D-442A-B973-643B51E13613\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D624EC2-7CEE-4ADC-A1D2-B0688AE23873\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"0702823F-52B6-40D3-B598-AA6F8745DB85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0910CB6C-8716-4A79-B43C-EB02B22AB632\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"FDEE0407-9473-4810-BC8D-F9AC44C69219\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_att_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA0DA3D1-0599-4364-AF1A-2DAD50382A15\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_3g_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"053DB989-17D5-49E1-BF0A-814F80D0FF62\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_3g_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8861227-5A7F-49CA-B0E6-5806C746B5B9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"6DB61681-FE91-4EA7-A431-446579A511C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FD37990-FF75-4323-A8B1-7BEF9A0001D7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"234CD8A4-BA72-47A5-8BAF-B449315A2202\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56CE797B-2D4B-41CC-888E-467F64BDB19C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"428076C7-97EC-47C9-B409-C1C9379A6E29\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_att_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40F4219D-1822-471E-88C0-7B6F5FB56A00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_3g_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"0D64F7DC-B719-46CF-8D6D-0E9CE24E5F31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_3g_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F287F24-13AD-4628-B724-E58A9F44E48B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_smart2_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"74CBDC4F-31FE-430A-BD2B-95985E2B8959\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_smart2_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37A2DC0B-6B50-4E38-9585-B131DBCB9F51\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_smart2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"1E3AAE8C-4A1C-4DA7-B710-F1458E9E472E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_smart2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50690731-FA99-45B3-AF4C-C1DAD881CAEE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\\\/dtx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"FF284D31-EA9B-48F3-A261-78672D3A8BF3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\\\/dtx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E62C758-015E-4178-BA37-D463F95BD468\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\\\/dtx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"5E7D20EC-CBAA-48C2-91A9-7964A64C5F51\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\\\/dtx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA35CCC1-2FE0-4FA7-A360-C2F9849476B0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"EC86EA88-023D-477B-9138-6F16DC173EB0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1726B1D9-3CAF-4C11-BB25-C7677B2CEE33\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx-p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"CADDBA01-FB75-4B02-B100-28E7BE105C80\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx-p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F88246FF-5453-4473-992B-AEEFE88ED41D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx-m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"732BF960-A8C6-4BF3-B58E-A142D1349560\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A87B204-19D0-4E12-B462-EB4BB25D196E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"9BA76759-0346-4978-B865-4C11D733A381\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EEEC9DE-5CF5-4596-B64C-6CAA32110FA1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_rs2005_tx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"4DDAE7BE-54B1-472F-80D6-A5B3BC4F9035\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_rs2005_tx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9887CEB-57EA-49A0-9CFD-910DAFE4A09D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\\\/tx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"7F1794B6-B631-488C-B7DC-7D3E79C0D9CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\\\/tx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3051DBA5-8D2B-4630-8FA7-602AC7CB4576\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\\\/tx-b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"ABBD929B-2E97-48F6-835E-9B217C846DE8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\\\/tx-b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"428D6C77-0592-4031-933E-2CFE0AB58BA7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"DD719D49-5D66-4E3F-896C-97D0BCF0C2C6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A698B47-3DF4-4FAB-9AA6-425FF823F303\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"B4A8A58D-90BC-4E6B-9CAD-7B8A72ACE990\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADB6EF67-BB61-4661-977B-A4968641E9BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"D8775CE8-282C-498C-9EA2-542338025F1B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_pci4000_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FFEEEAD-22B2-49FC-8B2B-583D9DFFB291\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"2B608EB3-6BA1-4D4F-B3E4-31B984CD0B0F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_pci4000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24EB7394-6BE3-44F4-A184-BA438200F532\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_gt\\\\/gt_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"72335756-555D-413F-955B-02F57C6B8C01\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_gt\\\\/gt_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C3B0286-BD27-4032-B4FF-0A7481356039\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_gt\\\\/gt_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"6CF8B1A6-81B0-4A50-A340-2BA68922F614\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_gt\\\\/gt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12FBC961-F834-4334-948A-9FC9E613301D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\\\/tx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"EAC710BB-60A5-4F43-AEF3-4BFCA13846F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\\\/tx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA9CB765-BEE4-4318-ADBD-EE241CA9FA31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\\\/tx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"E28ED34B-2510-48B6-A2A8-55EB0937ABCE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\\\/tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FBF005C-9157-49E2-820F-C75B3828EDA1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"050BE7DC-F22E-4022-A113-8A951170617A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_core_tx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"577E14AD-C198-4E8B-AC31-FF89F3EB97C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"A091DE68-F0CE-480D-BD5E-90BD582ED1AE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_core_tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B549B2C1-42A9-4D05-B32D-6E08A2BECBEF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_centerport_vpn-1000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"29581AAB-05BC-43F2-9527-1377413529E4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_centerport_vpn-1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20459672-988A-403E-9073-37F3B38F972E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_4305_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.4.1\",\"matchCriteriaId\":\"65B7E551-0057-48E6-AEA8-33588AA4C54C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_4305:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31D36718-F7F5-40E4-9A01-58475943AB8E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_4302_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.4.1\",\"matchCriteriaId\":\"16F72A3C-1E6A-4642-94C4-C2EA14C67A31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_4302:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C68D03F-E473-4F34-85FA-F7C81859E976\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_4102_pcie_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.4.1\",\"matchCriteriaId\":\"73C34979-43F9-4D09-B8DD-64B741247AE5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_4102_pcie:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADCA6B7B-1420-4B75-8AF1-245C48A0809C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_4102_pci_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.4.1\",\"matchCriteriaId\":\"72C5CD24-7FB6-4482-A9C6-22B35B3DFE47\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_4102_pci:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF36E8F0-08B9-46B2-B5E1-E207C70A0447\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_2105_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.4.1\",\"matchCriteriaId\":\"CEA88A13-7425-4EDB-89EC-BC68E6985FFA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_2105:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5DF8E58-5E12-4214-B659-5FC6CEB18879\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_2102_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.4.1\",\"matchCriteriaId\":\"AAC77981-EC77-4273-AAAA-0D715F6C75C6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_2102:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E3DCBF6-F308-4B53-A3CA-5A799A82F579\"}]}]}],\"references\":[{\"url\":\"https://cert.vde.com/en/advisories/VDE-2024-052\",\"source\":\"info@cert.vde.com\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-7734\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T15:54:22.823770Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:phoenixcontact:fl_mguard_centerport_vpn-1000_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\\\/tx_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\\\/tx_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_gt\\\\/gt_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_gt\\\\/gt_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\\\/tx-b_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\\\/tx_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_rs2005_tx_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx-m_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx-p_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\\\/dtx_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\\\/dtx_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_smart2_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_smart2_vpn_firmware:*:*:*:*:*:*:*:*\"], \"vendor\": \"phoenixcontact\", \"product\": \"fl_mguard_smart2_vpn_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:o:phoenixcontact:fl_mguard_2102_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_2105_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_4102_pcie_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_4102_pci_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_4302_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_4305_firmware:*:*:*:*:*:*:*:*\"], \"vendor\": \"phoenixcontact\", \"product\": \"fl_mguard_4305_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"10.4.1\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_3g_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_3g_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*\"], \"vendor\": \"phoenixcontact\", \"product\": \"tc_mguard_rs4000_4g_vzw_vpn_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-10T15:59:18.896Z\"}}], \"cna\": {\"title\": \"Phoenix Contact: Multiple mGuard devices are vulnerable to a drain of open file descriptors.\", \"source\": {\"defect\": [\"CERT@VDE#641676\"], \"advisory\": \"VDE-2024-052\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD 2102\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"10.4.1\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD 2105\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"10.4.1\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD 4102 PCI\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"10.4.1\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD 4102 PCIE\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"10.4.1\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD 4302\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"10.4.1\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD 4305\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"10.4.1\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD CENTERPORT VPN-1000\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD CORE TX\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD CORE TX VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD DELTA TX/TX\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD DELTA TX/TX VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD GT/GT\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD GT/GT VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD PCI4000\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD PCI4000 VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD PCIE4000\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD PCIE4000 VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD RS2000 TX/TX-B\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD RS2000 TX/TX VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD RS2005 TX VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD RS4000 TX/TX\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD RS4000 TX/TX-M\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD RS4000 TX/TX-P\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD RS4000 TX/TX VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD RS4004 TX/DTX\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD RS4004 TX/DTX VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD SMART2\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD SMART2 VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"TC MGUARD RS2000 3G VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"TC MGUARD RS2000 4G ATT VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"TC MGUARD RS2000 4G VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"TC MGUARD RS2000 4G VZW VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"TC MGUARD RS4000 3G VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"TC MGUARD RS4000 4G ATT VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"TC MGUARD RS4000 4G VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"TC MGUARD RS4000 4G VZW VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://cert.vde.com/en/advisories/VDE-2024-052\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An unauthenticated remote attacker can\\u00a0exploit the behavior of the\\u00a0pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to\\u00a0blocking of valid IPsec VPN peers.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"An unauthenticated remote attacker can\u0026nbsp;exploit the behavior of the\u0026nbsp;pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to\u0026nbsp;blocking of valid IPsec VPN peers.\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-770\", \"description\": \"CWE-770 Allocation of Resources Without Limits or Throttling\"}]}], \"providerMetadata\": {\"orgId\": \"270ccfa6-a436-4e77-922e-914ec3a9685c\", \"shortName\": \"CERTVDE\", \"dateUpdated\": \"2024-09-10T08:03:19.477Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-7734\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-10T16:00:45.691Z\", \"dateReserved\": \"2024-08-13T12:52:12.930Z\", \"assignerOrgId\": \"270ccfa6-a436-4e77-922e-914ec3a9685c\", \"datePublished\": \"2024-09-10T08:03:19.477Z\", \"assignerShortName\": \"CERTVDE\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…