Lucene search

K
nvd[email protected]NVD:CVE-2023-2673
HistoryJun 13, 2023 - 7:15 a.m.

CVE-2023-2673

2023-06-1307:15:46
CWE-20
web.nvd.nist.gov
1
improper input validation
phoenix contact fl/tc mguard family
udp packets
filter rules
flooding attacks

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.9%

Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allowΒ UDP packets to bypass the filter rules and access the solely connected device behind the MGUARD which can be used for flooding attacks.

Affected configurations

NVD
Node
phoenixcontactfl_mguard_2102Match-
AND
phoenixcontactfl_mguard_2102_firmwareRange≀10.1.1
Node
phoenixcontactfl_mguard_4102_pciMatch-
AND
phoenixcontactfl_mguard_4102_pci_firmwareRange≀10.1.1
Node
phoenixcontactfl_mguard_4102_pcieMatch-
AND
phoenixcontactfl_mguard_4102_pcie_firmwareRange≀10.1.1
Node
phoenixcontactfl_mguard_4302Match-
AND
phoenixcontactfl_mguard_4302_firmwareRange≀10.1.1
Node
phoenixcontactfl_mguard_centerportMatch-
AND
phoenixcontactfl_mguard_centerport_firmwareRange≀8.9.0
Node
phoenixcontactfl_mguard_centerport_vpn-1000Match-
AND
phoenixcontactfl_mguard_centerport_vpn-1000_firmwareRange≀8.9.0
Node
phoenixcontactfl_mguard_core_txMatch-
AND
phoenixcontactfl_mguard_core_tx_firmwareRange≀8.9.0
Node
phoenixcontactfl_mguard_core_tx_vpnMatch-
AND
phoenixcontactfl_mguard_core_tx_vpn_firmwareRange≀8.9.0
Node
phoenixcontactfl_mguard_delta_tx\/tx_firmwareRange≀8.9.0
AND
phoenixcontactfl_mguard_delta_tx\/txMatch-
Node
phoenixcontactfl_mguard_delta_tx\/tx_vpn_firmwareRange≀8.9.0
AND
phoenixcontactfl_mguard_delta_tx\/tx_vpnMatch-
Node
phoenixcontactfl_mguard_gt\/gt_firmwareRange≀8.9.0
AND
phoenixcontactfl_mguard_gt\/gtMatch-
Node
phoenixcontactfl_mguard_gt\/gt_vpn_firmwareRange≀8.9.0
AND
phoenixcontactfl_mguard_gt\/gt_vpnMatch-
Node
phoenixcontactfl_mguard_pci4000_firmwareRange≀8.9.0
AND
phoenixcontactfl_mguard_pci4000Match-
Node
phoenixcontactfl_mguard_pci4000_vpn_firmwareRange≀8.9.0
AND
phoenixcontactfl_mguard_pci4000_vpnMatch-
Node
phoenixcontactfl_mguard_pcie4000_firmwareRange≀8.9.0
AND
phoenixcontactfl_mguard_pcie4000Match-
Node
phoenixcontactfl_mguard_pcie4000_vpn_firmwareRange≀8.9.0
AND
phoenixcontactfl_mguard_pcie4000_vpnMatch-
Node
phoenixcontactfl_mguard_rs2000_tx\/tx-b_firmwareRange≀8.9.0
AND
phoenixcontactfl_mguard_rs2000_tx\/tx-bMatch-
Node
phoenixcontactfl_mguard_rs2000_tx\/tx_vpn_firmwareRange≀8.9.0
AND
phoenixcontactfl_mguard_rs2000_tx\/tx_vpnMatch-
Node
phoenixcontactfl_mguard_rs2005_tx_vpn_firmwareRange≀8.9.0
AND
phoenixcontactfl_mguard_rs2005_tx_vpnMatch-
Node
phoenixcontactfl_mguard_rs4000_tx\/tx-m_firmwareRange≀8.9.0
AND
phoenixcontactfl_mguard_rs4000_tx\/tx-mMatch-
Node
phoenixcontactfl_mguard_rs4000_tx\/tx-p_firmwareRange≀8.9.0
AND
phoenixcontactfl_mguard_rs4000_tx\/tx-pMatch-
Node
phoenixcontactfl_mguard_rs4000_tx\/tx_vpn_firmwareRange≀8.9.0
AND
phoenixcontactfl_mguard_rs4000_tx\/tx_vpnMatch-
Node
phoenixcontactfl_mguard_rs4004_tx\/dtx_firmwareRange≀8.9.0
AND
phoenixcontactfl_mguard_rs4004_tx\/dtxMatch-
Node
phoenixcontactfl_mguard_rs4004_tx\/dtx_vpn_firmwareRange≀8.9.0
AND
phoenixcontactfl_mguard_rs4004_tx\/dtx_vpnMatch-
Node
phoenixcontactfl_mguard_smart2_firmwareRange≀8.9.0
AND
phoenixcontactfl_mguard_smart2Match-
Node
phoenixcontactfl_mguard_smart2_vpn_firmwareRange≀8.9.0
AND
phoenixcontactfl_mguard_smart2_vpnMatch-

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

5.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.9%

Related for NVD:CVE-2023-2673