Lucene search

K
cve[email protected]CVE-2020-12523
HistoryDec 17, 2020 - 11:15 p.m.

CVE-2020-12523

2020-12-1723:15:13
CWE-909
web.nvd.nist.gov
24
cve-2020-12523
phoenix contact
mguard devices
security vulnerability
lan ports
device configuration
resource initialization

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

9.1 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

60.7%

On Phoenix Contact mGuard Devices versions before 8.8.3 LAN ports get functional after reboot even if they are disabled in the device configuration. For mGuard devices with integrated switch on the LAN side, single switch ports can be disabled by device configuration. After a reboot these ports get functional independent from their configuration setting: Missing Initialization of Resource

Affected configurations

NVD
Node
phoenixcontacttc_mguard_rs4000_4g_vzw_vpn_firmwareRange<8.8.3
AND
phoenixcontacttc_mguard_rs4000_4g_vzw_vpnMatch-
Node
phoenixcontacttc_mguard_rs4000_4g_att_vpn_firmwareRange<8.8.3
AND
phoenixcontacttc_mguard_rs4000_4g_att_vpnMatch-
Node
phoenixcontactfl_mguard_rs4004_tx\/dtx_firmwareRange<8.8.3
AND
phoenixcontactfl_mguard_rs4004_tx\/dtxMatch-
Node
phoenixcontactfl_mguard_rs4004_tx\/dtx_vpn_firmwareRange<8.8.3
AND
phoenixcontactfl_mguard_rs4004_tx\/dtx_vpnMatch-
Node
phoenixcontacttc_mguard_rs4000_3g_vpn_firmwareMatch-
AND
phoenixcontacttc_mguard_rs4000_3g_vpnMatch-
Node
phoenixcontacttc_mguard_rs4000_4g_vpn_firmwareRange<8.8.3
AND
phoenixcontacttc_mguard_rs4000_4g_vpnMatch-
Node
phoenixcontactinnominate_mguard_rs4000_4tx\/tx_firmwareRange<8.8.3
AND
phoenixcontactinnominate_mguard_rs4000_4tx\/txMatch-
Node
phoenixcontactinnominate_mguard_rs4000_4tx\/tx_vpn_firmwareRange<8.8.3
AND
phoenixcontactinnominate_mguard_rs4000_4tx\/tx_vpnMatch-
Node
phoenixcontactinnominate_mguard_rs4000_4tx\/3g\/tx_vpn_firmwareRange<8.8.3
AND
phoenixcontactinnominate_mguard_rs4000_4tx\/3g\/tx_vpnMatch-

CNA Affected

[
  {
    "product": "TC MGUARD RS4000 4G VZW VPN (1010461)",
    "vendor": "Phoenix Contact",
    "versions": [
      {
        "lessThan": "8.8.3",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "TC MGUARD RS4000 4G ATT VPN (1010463)",
    "vendor": "Phoenix Contact",
    "versions": [
      {
        "lessThan": "8.8.3",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "FL MGUARD RS4004 TX/DTX (2701876)",
    "vendor": "Phoenix Contact",
    "versions": [
      {
        "lessThan": "8.8.3",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "FL MGUARD RS4004 TX/DTX VPN (2701877)",
    "vendor": "Phoenix Contact",
    "versions": [
      {
        "lessThan": "8.8.3",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "TC MGUARD RS4000 3G VPN (2903440)",
    "vendor": "Phoenix Contact",
    "versions": [
      {
        "lessThan": "8.8.3",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "TC MGUARD RS4000 4G VPN (2903586)",
    "vendor": "Phoenix Contact",
    "versions": [
      {
        "lessThan": "8.8.3",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Innominate mGuard rs4000 4TX/TX",
    "vendor": "Innominate",
    "versions": [
      {
        "lessThan": "8.8.3",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Innominate mGuard rs4000 4TX/TX VPN",
    "vendor": "Innominate",
    "versions": [
      {
        "lessThan": "8.8.3",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "Innominate mGuard rs4000 4TX/3G/TX VPN",
    "vendor": "Innominate",
    "versions": [
      {
        "lessThan": "8.8.3",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

6.4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:N/A:P

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

9.1 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

60.7%

Related for CVE-2020-12523