CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
AI Score
Confidence
High
EPSS
Percentile
19.7%
Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allowΒ UDP packets to bypass the filter rules and access the solely connected device behind the MGUARD which can be used for flooding attacks.
Vendor | Product | Version | CPE |
---|---|---|---|
phoenixcontact | fl_mguard_2102 | - | cpe:2.3:h:phoenixcontact:fl_mguard_2102:-:*:*:*:*:*:*:* |
phoenixcontact | fl_mguard_2102_firmware | * | cpe:2.3:o:phoenixcontact:fl_mguard_2102_firmware:*:*:*:*:*:*:*:* |
phoenixcontact | fl_mguard_4102_pci | - | cpe:2.3:h:phoenixcontact:fl_mguard_4102_pci:-:*:*:*:*:*:*:* |
phoenixcontact | fl_mguard_4102_pci_firmware | * | cpe:2.3:o:phoenixcontact:fl_mguard_4102_pci_firmware:*:*:*:*:*:*:*:* |
phoenixcontact | fl_mguard_4102_pcie | - | cpe:2.3:h:phoenixcontact:fl_mguard_4102_pcie:-:*:*:*:*:*:*:* |
phoenixcontact | fl_mguard_4102_pcie_firmware | * | cpe:2.3:o:phoenixcontact:fl_mguard_4102_pcie_firmware:*:*:*:*:*:*:*:* |
phoenixcontact | fl_mguard_4302 | - | cpe:2.3:h:phoenixcontact:fl_mguard_4302:-:*:*:*:*:*:*:* |
phoenixcontact | fl_mguard_4302_firmware | * | cpe:2.3:o:phoenixcontact:fl_mguard_4302_firmware:*:*:*:*:*:*:*:* |
phoenixcontact | fl_mguard_centerport | - | cpe:2.3:h:phoenixcontact:fl_mguard_centerport:-:*:*:*:*:*:*:* |
phoenixcontact | fl_mguard_centerport_firmware | * | cpe:2.3:o:phoenixcontact:fl_mguard_centerport_firmware:*:*:*:*:*:*:*:* |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
AI Score
Confidence
High
EPSS
Percentile
19.7%