CVE-2020-12523 (GCVE-0-2020-12523)
Vulnerability from cvelistv5
Published
2020-12-17 22:43
Modified
2024-09-16 19:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-909 - Missing Initialization of Resource
Summary
On Phoenix Contact mGuard Devices versions before 8.8.3 LAN ports get functional after reboot even if they are disabled in the device configuration. For mGuard devices with integrated switch on the LAN side, single switch ports can be disabled by device configuration. After a reboot these ports get functional independent from their configuration setting: Missing Initialization of Resource
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Phoenix Contact | TC MGUARD RS4000 4G VZW VPN (1010461) |
Version: unspecified < 8.8.3 |
|||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:56:52.083Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2020-046" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "TC MGUARD RS4000 4G VZW VPN (1010461)", "vendor": "Phoenix Contact", "versions": [ { "lessThan": "8.8.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "TC MGUARD RS4000 4G ATT VPN (1010463)", "vendor": "Phoenix Contact", "versions": [ { "lessThan": "8.8.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "FL MGUARD RS4004 TX/DTX (2701876)", "vendor": "Phoenix Contact", "versions": [ { "lessThan": "8.8.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "FL MGUARD RS4004 TX/DTX VPN (2701877)", "vendor": "Phoenix Contact", "versions": [ { "lessThan": "8.8.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "TC MGUARD RS4000 3G VPN (2903440)", "vendor": "Phoenix Contact", "versions": [ { "lessThan": "8.8.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "TC MGUARD RS4000 4G VPN (2903586)", "vendor": "Phoenix Contact", "versions": [ { "lessThan": "8.8.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Innominate mGuard rs4000 4TX/TX", "vendor": "Innominate", "versions": [ { "lessThan": "8.8.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Innominate mGuard rs4000 4TX/TX VPN", "vendor": "Innominate", "versions": [ { "lessThan": "8.8.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Innominate mGuard rs4000 4TX/3G/TX VPN", "vendor": "Innominate", "versions": [ { "lessThan": "8.8.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Discovered by SMST Designers \u0026 Constructors B.V., Phoenix Contact reported to CERT@VDE" } ], "datePublic": "2020-12-17T00:00:00", "descriptions": [ { "lang": "en", "value": "On Phoenix Contact mGuard Devices versions before 8.8.3 LAN ports get functional after reboot even if they are disabled in the device configuration. For mGuard devices with integrated switch on the LAN side, single switch ports can be disabled by device configuration. After a reboot these ports get functional independent from their configuration setting: Missing Initialization of Resource" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-909", "description": "CWE-909 Missing Initialization of Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-17T22:43:14", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2020-046" } ], "solutions": [ { "lang": "en", "value": "PHOENIX CONTACT recommends all mGuard users to upgrade to the firmware version 8.8.3." } ], "source": { "advisory": "VDE-2020-046", "defect": [ "VDE-2020-046" ], "discovery": "EXTERNAL" }, "title": "Phoenix Contact mGuard Devices versions before 8.8.3: LAN ports get functional after reboot even if they are disabled in the device configuration", "workarounds": [ { "lang": "en", "value": "Instead of deactivating by configuration, network cables should be detached from affected switch ports." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "AKA": "", "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2020-12-17T09:00:00.000Z", "ID": "CVE-2020-12523", "STATE": "PUBLIC", "TITLE": "Phoenix Contact mGuard Devices versions before 8.8.3: LAN ports get functional after reboot even if they are disabled in the device configuration" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "TC MGUARD RS4000 4G VZW VPN (1010461)", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c", "version_name": "", "version_value": "8.8.3" } ] } }, { "product_name": "TC MGUARD RS4000 4G ATT VPN (1010463)", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c", "version_name": "", "version_value": "8.8.3" } ] } }, { "product_name": "FL MGUARD RS4004 TX/DTX (2701876)", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c", "version_name": "", "version_value": "8.8.3" } ] } }, { "product_name": "FL MGUARD RS4004 TX/DTX VPN (2701877)", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c", "version_name": "", "version_value": "8.8.3" } ] } }, { "product_name": "TC MGUARD RS4000 3G VPN (2903440)", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c", "version_name": "", "version_value": "8.8.3" } ] } }, { "product_name": "TC MGUARD RS4000 4G VPN (2903586)", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c", "version_name": "", "version_value": "8.8.3" } ] } } ] }, "vendor_name": "Phoenix Contact" }, { "product": { "product_data": [ { "product_name": "Innominate mGuard rs4000 4TX/TX", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c", "version_name": "", "version_value": "8.8.3" } ] } }, { "product_name": "Innominate mGuard rs4000 4TX/TX VPN", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c", "version_name": "", "version_value": "8.8.3" } ] } }, { "product_name": "Innominate mGuard rs4000 4TX/3G/TX VPN", "version": { "version_data": [ { "platform": "", "version_affected": "\u003c", "version_name": "", "version_value": "8.8.3" } ] } } ] }, "vendor_name": "Innominate" } ] } }, "configuration": [], "credit": [ { "lang": "eng", "value": "Discovered by SMST Designers \u0026 Constructors B.V., Phoenix Contact reported to CERT@VDE" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "On Phoenix Contact mGuard Devices versions before 8.8.3 LAN ports get functional after reboot even if they are disabled in the device configuration. For mGuard devices with integrated switch on the LAN side, single switch ports can be disabled by device configuration. After a reboot these ports get functional independent from their configuration setting: Missing Initialization of Resource" } ] }, "exploit": [], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-909 Missing Initialization of Resource" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/en-us/advisories/vde-2020-046", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2020-046" } ] }, "solution": [ { "lang": "en", "value": "PHOENIX CONTACT recommends all mGuard users to upgrade to the firmware version 8.8.3." } ], "source": { "advisory": "VDE-2020-046", "defect": [ "VDE-2020-046" ], "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "value": "Instead of deactivating by configuration, network cables should be detached from affected switch ports." } ] } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2020-12523", "datePublished": "2020-12-17T22:43:14.788183Z", "dateReserved": "2020-04-30T00:00:00", "dateUpdated": "2024-09-16T19:04:46.625Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-12523\",\"sourceIdentifier\":\"info@cert.vde.com\",\"published\":\"2020-12-17T23:15:13.263\",\"lastModified\":\"2024-11-21T04:59:51.767\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"On Phoenix Contact mGuard Devices versions before 8.8.3 LAN ports get functional after reboot even if they are disabled in the device configuration. For mGuard devices with integrated switch on the LAN side, single switch ports can be disabled by device configuration. After a reboot these ports get functional independent from their configuration setting: Missing Initialization of Resource\"},{\"lang\":\"es\",\"value\":\"En Phoenix Contact mGuard Devices versiones anteriores a 8.8.3, los puertos LAN funcionan despu\u00e9s del reinicio, inclusive si est\u00e1n desactivados en la configuraci\u00f3n del dispositivo.\u0026#xa0;Para los dispositivos mGuard con switch integrado en el lado de la LAN, los puertos switch \u00fanicos pueden ser desactivados mediante la configuraci\u00f3n del dispositivo.\u0026#xa0;Despu\u00e9s de un reinicio, estos puertos se vuelven funcionales independientemente de su configuraci\u00f3n: Falta la Inicializaci\u00f3n del Recurso\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":2.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:P\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-909\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-909\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.8.3\",\"matchCriteriaId\":\"A23E2F36-6124-424D-AA03-634EBD6F0B6F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D624EC2-7CEE-4ADC-A1D2-B0688AE23873\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.8.3\",\"matchCriteriaId\":\"67439834-834F-4EBA-90DA-31CA956F3B1C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_att_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA0DA3D1-0599-4364-AF1A-2DAD50382A15\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\\\/dtx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.8.3\",\"matchCriteriaId\":\"B238B828-18C9-4A47-AAC8-76EAD2FC791F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\\\/dtx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA35CCC1-2FE0-4FA7-A360-C2F9849476B0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\\\/dtx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.8.3\",\"matchCriteriaId\":\"5437C9C1-CFFE-4F26-94B2-6AD74F083669\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\\\/dtx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E62C758-015E-4178-BA37-D463F95BD468\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_3g_vpn_firmware:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB2F3D77-7685-4D59-88E7-5E85D28C1EA3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_3g_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8861227-5A7F-49CA-B0E6-5806C746B5B9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.8.3\",\"matchCriteriaId\":\"749E8750-1D7D-49E4-914D-E3ADFC6EF0A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0910CB6C-8716-4A79-B43C-EB02B22AB632\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:innominate_mguard_rs4000_4tx\\\\/tx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.8.3\",\"matchCriteriaId\":\"8755CB8C-533E-4EB4-BB62-46886A3C34C4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:innominate_mguard_rs4000_4tx\\\\/tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42EB9EFF-4D1B-4A48-AA37-54D5E18CD3CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:innominate_mguard_rs4000_4tx\\\\/tx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.8.3\",\"matchCriteriaId\":\"6870740D-65AA-40AD-BA84-FA6AF4DEEFD8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:innominate_mguard_rs4000_4tx\\\\/tx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D31B090-FA3C-4F01-87B9-7699CCFA4737\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:innominate_mguard_rs4000_4tx\\\\/3g\\\\/tx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.8.3\",\"matchCriteriaId\":\"3036E4C8-A09C-4983-9E8B-1528B962E151\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:innominate_mguard_rs4000_4tx\\\\/3g\\\\/tx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6FCE11B-E439-4D71-B9C3-E36D1B6AD587\"}]}]}],\"references\":[{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2020-046\",\"source\":\"info@cert.vde.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2020-046\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…