Product:

Tc_mguard_rs4000_4g_vzw_vpn_firmware

(Phoenixcontact)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 14
Date Id Summary Products Score Patch Annotated
2024-09-10 CVE-2024-43388 A low privileged remote attacker with write permissions can reconfigure the SNMP service due to improper input validation. Fl_mguard_2102_firmware, Fl_mguard_2105_firmware, Fl_mguard_4102_pci_firmware, Fl_mguard_4102_pcie_firmware, Fl_mguard_4302_firmware, Fl_mguard_4305_firmware, Fl_mguard_centerport_vpn\-1000_firmware, Fl_mguard_core_tx_firmware, Fl_mguard_core_tx_vpn_firmware, Fl_mguard_delta_tx\/tx_firmware, Fl_mguard_delta_tx\/tx_vpn_firmware, Fl_mguard_gt\/gt_firmware, Fl_mguard_gt\/gt_vpn_firmware, Fl_mguard_pci4000_firmware, Fl_mguard_pci4000_vpn_firmware, Fl_mguard_pcie4000_firmware, Fl_mguard_pcie4000_vpn_firmware, Fl_mguard_rs2000_tx\/tx\-B_firmware, Fl_mguard_rs2000_tx\/tx_vpn_firmware, Fl_mguard_rs2005_tx_vpn_firmware, Fl_mguard_rs4000_tx\/tx\-M_firmware, Fl_mguard_rs4000_tx\/tx\-P_firmware, Fl_mguard_rs4000_tx\/tx_firmware, Fl_mguard_rs4000_tx\/tx_vpn_firmware, Fl_mguard_rs4004_tx\/dtx_firmware, Fl_mguard_rs4004_tx\/dtx_vpn_firmware, Fl_mguard_smart2_firmware, Fl_mguard_smart2_vpn_firmware, Tc_mguard_rs2000_3g_vpn_firmware, Tc_mguard_rs2000_4g_att_vpn_firmware, Tc_mguard_rs2000_4g_vpn_firmware, Tc_mguard_rs2000_4g_vzw_vpn_firmware, Tc_mguard_rs4000_3g_vpn_firmware, Tc_mguard_rs4000_4g_att_vpn_firmware, Tc_mguard_rs4000_4g_vpn_firmware, Tc_mguard_rs4000_4g_vzw_vpn_firmware 8.8
2024-09-10 CVE-2024-7698 A low privileged remote attacker canĀ get access to CSRF tokens of higher privileged users which can be abused to mount CSRF attacks. Fl_mguard_2102_firmware, Fl_mguard_2105_firmware, Fl_mguard_4102_pci_firmware, Fl_mguard_4102_pcie_firmware, Fl_mguard_4302_firmware, Fl_mguard_4305_firmware, Fl_mguard_centerport_vpn\-1000_firmware, Fl_mguard_core_tx_firmware, Fl_mguard_core_tx_vpn_firmware, Fl_mguard_delta_tx\/tx_firmware, Fl_mguard_delta_tx\/tx_vpn_firmware, Fl_mguard_gt\/gt_firmware, Fl_mguard_gt\/gt_vpn_firmware, Fl_mguard_pci4000_firmware, Fl_mguard_pci4000_vpn_firmware, Fl_mguard_pcie4000_firmware, Fl_mguard_pcie4000_vpn_firmware, Fl_mguard_rs2000_tx\/tx\-B_firmware, Fl_mguard_rs2000_tx\/tx_vpn_firmware, Fl_mguard_rs2005_tx_vpn_firmware, Fl_mguard_rs4000_tx\/tx\-M_firmware, Fl_mguard_rs4000_tx\/tx\-P_firmware, Fl_mguard_rs4000_tx\/tx_firmware, Fl_mguard_rs4000_tx\/tx_vpn_firmware, Fl_mguard_rs4004_tx\/dtx_firmware, Fl_mguard_rs4004_tx\/dtx_vpn_firmware, Fl_mguard_smart2_firmware, Fl_mguard_smart2_vpn_firmware, Tc_mguard_rs2000_3g_vpn_firmware, Tc_mguard_rs2000_4g_att_vpn_firmware, Tc_mguard_rs2000_4g_vpn_firmware, Tc_mguard_rs2000_4g_vzw_vpn_firmware, Tc_mguard_rs4000_3g_vpn_firmware, Tc_mguard_rs4000_4g_att_vpn_firmware, Tc_mguard_rs4000_4g_vpn_firmware, Tc_mguard_rs4000_4g_vzw_vpn_firmware 5.7
2024-09-10 CVE-2024-7699 An low privileged remote attacker can execute OS commands with root privileges due to improper neutralization of special elements in user data. Fl_mguard_2102_firmware, Fl_mguard_2105_firmware, Fl_mguard_4102_pci_firmware, Fl_mguard_4102_pcie_firmware, Fl_mguard_4302_firmware, Fl_mguard_4305_firmware, Fl_mguard_centerport_vpn\-1000_firmware, Fl_mguard_core_tx_firmware, Fl_mguard_core_tx_vpn_firmware, Fl_mguard_delta_tx\/tx_firmware, Fl_mguard_delta_tx\/tx_vpn_firmware, Fl_mguard_gt\/gt_firmware, Fl_mguard_gt\/gt_vpn_firmware, Fl_mguard_pci4000_firmware, Fl_mguard_pci4000_vpn_firmware, Fl_mguard_pcie4000_firmware, Fl_mguard_pcie4000_vpn_firmware, Fl_mguard_rs2000_tx\/tx\-B_firmware, Fl_mguard_rs2000_tx\/tx_vpn_firmware, Fl_mguard_rs2005_tx_vpn_firmware, Fl_mguard_rs4000_tx\/tx\-M_firmware, Fl_mguard_rs4000_tx\/tx\-P_firmware, Fl_mguard_rs4000_tx\/tx_firmware, Fl_mguard_rs4000_tx\/tx_vpn_firmware, Fl_mguard_rs4004_tx\/dtx_firmware, Fl_mguard_rs4004_tx\/dtx_vpn_firmware, Fl_mguard_smart2_firmware, Fl_mguard_smart2_vpn_firmware, Tc_mguard_rs2000_3g_vpn_firmware, Tc_mguard_rs2000_4g_att_vpn_firmware, Tc_mguard_rs2000_4g_vpn_firmware, Tc_mguard_rs2000_4g_vzw_vpn_firmware, Tc_mguard_rs4000_3g_vpn_firmware, Tc_mguard_rs4000_4g_att_vpn_firmware, Tc_mguard_rs4000_4g_vpn_firmware, Tc_mguard_rs4000_4g_vzw_vpn_firmware 8.8
2020-12-17 CVE-2020-12523 On Phoenix Contact mGuard Devices versions before 8.8.3 LAN ports get functional after reboot even if they are disabled in the device configuration. For mGuard devices with integrated switch on the LAN side, single switch ports can be disabled by device configuration. After a reboot these ports get functional independent from their configuration setting: Missing Initialization of Resource Fl_mguard_rs4004_tx\/dtx_firmware, Fl_mguard_rs4004_tx\/dtx_vpn_firmware, Innominate_mguard_rs4000_4tx\/3g\/tx_vpn_firmware, Innominate_mguard_rs4000_4tx\/tx_firmware, Innominate_mguard_rs4000_4tx\/tx_vpn_firmware, Tc_mguard_rs4000_3g_vpn_firmware, Tc_mguard_rs4000_4g_att_vpn_firmware, Tc_mguard_rs4000_4g_vpn_firmware, Tc_mguard_rs4000_4g_vzw_vpn_firmware 9.1