CVE-2024-7734 (GCVE-0-2024-7734)
Vulnerability from cvelistv5
Published
2024-09-10 08:03
Modified
2024-09-10 16:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-770 - Allocation of Resources Without Limits or Throttling
Summary
An unauthenticated remote attacker can exploit the behavior of the pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to blocking of valid IPsec VPN peers.
References
► | URL | Tags | |||||
---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:phoenixcontact:fl_mguard_centerport_vpn-1000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_gt\\/gt_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs2005_tx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx-p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\/tx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\/dtx_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_smart2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_smart2_vpn_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fl_mguard_smart2_vpn_firmware", "vendor": "phoenixcontact", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:o:phoenixcontact:fl_mguard_2102_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_2105_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_4102_pcie_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_4102_pci_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_4302_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_mguard_4305_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fl_mguard_4305_firmware", "vendor": "phoenixcontact", "versions": [ { "lessThan": "10.4.1", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_3g_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_3g_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "tc_mguard_rs4000_4g_vzw_vpn_firmware", "vendor": "phoenixcontact", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-7734", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-10T15:54:22.823770Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-10T16:00:45.691Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "FL MGUARD 2102", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "10.4.1", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD 2105", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "10.4.1", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD 4102 PCI", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "10.4.1", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD 4102 PCIE", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "10.4.1", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD 4302", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "10.4.1", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD 4305", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "10.4.1", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD CENTERPORT VPN-1000", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD CORE TX", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD CORE TX VPN", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD DELTA TX/TX", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD DELTA TX/TX VPN", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD GT/GT", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD GT/GT VPN", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD PCI4000", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD PCI4000 VPN", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD PCIE4000", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD PCIE4000 VPN", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD RS2000 TX/TX-B", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD RS2000 TX/TX VPN", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD RS2005 TX VPN", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD RS4000 TX/TX", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD RS4000 TX/TX-M", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD RS4000 TX/TX-P", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD RS4000 TX/TX VPN", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD RS4004 TX/DTX", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD RS4004 TX/DTX VPN", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD SMART2", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "FL MGUARD SMART2 VPN", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TC MGUARD RS2000 3G VPN", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TC MGUARD RS2000 4G ATT VPN", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TC MGUARD RS2000 4G VPN", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TC MGUARD RS2000 4G VZW VPN", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TC MGUARD RS4000 3G VPN", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TC MGUARD RS4000 4G ATT VPN", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TC MGUARD RS4000 4G VPN", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TC MGUARD RS4000 4G VZW VPN", "vendor": "PHOENIX CONTACT", "versions": [ { "lessThan": "8.9.3", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An unauthenticated remote attacker can\u0026nbsp;exploit the behavior of the\u0026nbsp;pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to\u0026nbsp;blocking of valid IPsec VPN peers.\u003cbr\u003e" } ], "value": "An unauthenticated remote attacker can\u00a0exploit the behavior of the\u00a0pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to\u00a0blocking of valid IPsec VPN peers." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-770", "description": "CWE-770 Allocation of Resources Without Limits or Throttling", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-10T08:03:19.477Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2024-052" } ], "source": { "advisory": "VDE-2024-052", "defect": [ "CERT@VDE#641676" ], "discovery": "UNKNOWN" }, "title": "Phoenix Contact: Multiple mGuard devices are vulnerable to a drain of open file descriptors.", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2024-7734", "datePublished": "2024-09-10T08:03:19.477Z", "dateReserved": "2024-08-13T12:52:12.930Z", "dateUpdated": "2024-09-10T16:00:45.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-7734\",\"sourceIdentifier\":\"info@cert.vde.com\",\"published\":\"2024-09-10T08:15:04.020\",\"lastModified\":\"2024-09-28T23:56:32.053\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An unauthenticated remote attacker can\u00a0exploit the behavior of the\u00a0pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to\u00a0blocking of valid IPsec VPN peers.\"},{\"lang\":\"es\",\"value\":\"Un atacante remoto no autenticado puede explotar el comportamiento del servicio de encapsulaci\u00f3n TCP de Pathfinder estableciendo una gran cantidad de conexiones TCP con dicho servicio. El impacto se limita al bloqueo de pares VPN IPsec v\u00e1lidos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-770\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"CD02CC05-860D-442A-B973-643B51E13613\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D624EC2-7CEE-4ADC-A1D2-B0688AE23873\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"0702823F-52B6-40D3-B598-AA6F8745DB85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0910CB6C-8716-4A79-B43C-EB02B22AB632\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"FDEE0407-9473-4810-BC8D-F9AC44C69219\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_att_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA0DA3D1-0599-4364-AF1A-2DAD50382A15\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_3g_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"053DB989-17D5-49E1-BF0A-814F80D0FF62\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_3g_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8861227-5A7F-49CA-B0E6-5806C746B5B9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"6DB61681-FE91-4EA7-A431-446579A511C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FD37990-FF75-4323-A8B1-7BEF9A0001D7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"234CD8A4-BA72-47A5-8BAF-B449315A2202\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56CE797B-2D4B-41CC-888E-467F64BDB19C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"428076C7-97EC-47C9-B409-C1C9379A6E29\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_att_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40F4219D-1822-471E-88C0-7B6F5FB56A00\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_3g_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"0D64F7DC-B719-46CF-8D6D-0E9CE24E5F31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_3g_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F287F24-13AD-4628-B724-E58A9F44E48B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_smart2_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"74CBDC4F-31FE-430A-BD2B-95985E2B8959\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_smart2_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37A2DC0B-6B50-4E38-9585-B131DBCB9F51\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_smart2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"1E3AAE8C-4A1C-4DA7-B710-F1458E9E472E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_smart2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50690731-FA99-45B3-AF4C-C1DAD881CAEE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\\\/dtx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"FF284D31-EA9B-48F3-A261-78672D3A8BF3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\\\/dtx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E62C758-015E-4178-BA37-D463F95BD468\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\\\/dtx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"5E7D20EC-CBAA-48C2-91A9-7964A64C5F51\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_rs4004_tx\\\\/dtx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA35CCC1-2FE0-4FA7-A360-C2F9849476B0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"EC86EA88-023D-477B-9138-6F16DC173EB0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1726B1D9-3CAF-4C11-BB25-C7677B2CEE33\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx-p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"CADDBA01-FB75-4B02-B100-28E7BE105C80\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx-p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F88246FF-5453-4473-992B-AEEFE88ED41D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx-m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"732BF960-A8C6-4BF3-B58E-A142D1349560\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A87B204-19D0-4E12-B462-EB4BB25D196E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"9BA76759-0346-4978-B865-4C11D733A381\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EEEC9DE-5CF5-4596-B64C-6CAA32110FA1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_rs2005_tx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"4DDAE7BE-54B1-472F-80D6-A5B3BC4F9035\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_rs2005_tx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9887CEB-57EA-49A0-9CFD-910DAFE4A09D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\\\/tx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"7F1794B6-B631-488C-B7DC-7D3E79C0D9CA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\\\/tx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3051DBA5-8D2B-4630-8FA7-602AC7CB4576\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\\\/tx-b_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"ABBD929B-2E97-48F6-835E-9B217C846DE8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_rs2000_tx\\\\/tx-b:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"428D6C77-0592-4031-933E-2CFE0AB58BA7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"DD719D49-5D66-4E3F-896C-97D0BCF0C2C6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A698B47-3DF4-4FAB-9AA6-425FF823F303\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"B4A8A58D-90BC-4E6B-9CAD-7B8A72ACE990\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_pcie4000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADB6EF67-BB61-4661-977B-A4968641E9BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"D8775CE8-282C-498C-9EA2-542338025F1B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_pci4000_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FFEEEAD-22B2-49FC-8B2B-583D9DFFB291\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"2B608EB3-6BA1-4D4F-B3E4-31B984CD0B0F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_pci4000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24EB7394-6BE3-44F4-A184-BA438200F532\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_gt\\\\/gt_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"72335756-555D-413F-955B-02F57C6B8C01\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_gt\\\\/gt_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C3B0286-BD27-4032-B4FF-0A7481356039\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_gt\\\\/gt_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"6CF8B1A6-81B0-4A50-A340-2BA68922F614\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_gt\\\\/gt:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12FBC961-F834-4334-948A-9FC9E613301D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\\\/tx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"EAC710BB-60A5-4F43-AEF3-4BFCA13846F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\\\/tx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA9CB765-BEE4-4318-ADBD-EE241CA9FA31\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\\\/tx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"E28ED34B-2510-48B6-A2A8-55EB0937ABCE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_delta_tx\\\\/tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FBF005C-9157-49E2-820F-C75B3828EDA1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_vpn_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"050BE7DC-F22E-4022-A113-8A951170617A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_core_tx_vpn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"577E14AD-C198-4E8B-AC31-FF89F3EB97C2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"A091DE68-F0CE-480D-BD5E-90BD582ED1AE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_core_tx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B549B2C1-42A9-4D05-B32D-6E08A2BECBEF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_centerport_vpn-1000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.9.3\",\"matchCriteriaId\":\"29581AAB-05BC-43F2-9527-1377413529E4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_centerport_vpn-1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20459672-988A-403E-9073-37F3B38F972E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_4305_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.4.1\",\"matchCriteriaId\":\"65B7E551-0057-48E6-AEA8-33588AA4C54C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_4305:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31D36718-F7F5-40E4-9A01-58475943AB8E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_4302_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.4.1\",\"matchCriteriaId\":\"16F72A3C-1E6A-4642-94C4-C2EA14C67A31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_4302:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C68D03F-E473-4F34-85FA-F7C81859E976\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_4102_pcie_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.4.1\",\"matchCriteriaId\":\"73C34979-43F9-4D09-B8DD-64B741247AE5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_4102_pcie:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADCA6B7B-1420-4B75-8AF1-245C48A0809C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_4102_pci_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.4.1\",\"matchCriteriaId\":\"72C5CD24-7FB6-4482-A9C6-22B35B3DFE47\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_4102_pci:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF36E8F0-08B9-46B2-B5E1-E207C70A0447\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_2105_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.4.1\",\"matchCriteriaId\":\"CEA88A13-7425-4EDB-89EC-BC68E6985FFA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_2105:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5DF8E58-5E12-4214-B659-5FC6CEB18879\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_mguard_2102_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.4.1\",\"matchCriteriaId\":\"AAC77981-EC77-4273-AAAA-0D715F6C75C6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_mguard_2102:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E3DCBF6-F308-4B53-A3CA-5A799A82F579\"}]}]}],\"references\":[{\"url\":\"https://cert.vde.com/en/advisories/VDE-2024-052\",\"source\":\"info@cert.vde.com\",\"tags\":[\"Mitigation\",\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-7734\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T15:54:22.823770Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:phoenixcontact:fl_mguard_centerport_vpn-1000_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_core_tx_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\\\/tx_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_delta_tx\\\\/tx_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_gt\\\\/gt_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_gt\\\\/gt_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_pci4000_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_pcie4000_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\\\/tx-b_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_rs2000_tx\\\\/tx_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_rs2005_tx_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx-m_firmware:-:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx-p_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_rs4000_tx\\\\/tx_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\\\/dtx_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_rs4004_tx\\\\/dtx_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_smart2_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_smart2_vpn_firmware:*:*:*:*:*:*:*:*\"], \"vendor\": \"phoenixcontact\", \"product\": \"fl_mguard_smart2_vpn_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:o:phoenixcontact:fl_mguard_2102_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_2105_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_4102_pcie_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_4102_pci_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_4302_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:fl_mguard_4305_firmware:*:*:*:*:*:*:*:*\"], \"vendor\": \"phoenixcontact\", \"product\": \"fl_mguard_4305_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"10.4.1\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_3g_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_3g_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_att_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:*\", \"cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:*\"], \"vendor\": \"phoenixcontact\", \"product\": \"tc_mguard_rs4000_4g_vzw_vpn_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-10T15:59:18.896Z\"}}], \"cna\": {\"title\": \"Phoenix Contact: Multiple mGuard devices are vulnerable to a drain of open file descriptors.\", \"source\": {\"defect\": [\"CERT@VDE#641676\"], \"advisory\": \"VDE-2024-052\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD 2102\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"10.4.1\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD 2105\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"10.4.1\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD 4102 PCI\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"10.4.1\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD 4102 PCIE\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"10.4.1\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD 4302\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"10.4.1\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD 4305\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"10.4.1\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD CENTERPORT VPN-1000\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD CORE TX\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD CORE TX VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD DELTA TX/TX\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD DELTA TX/TX VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD GT/GT\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD GT/GT VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD PCI4000\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD PCI4000 VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD PCIE4000\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD PCIE4000 VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD RS2000 TX/TX-B\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD RS2000 TX/TX VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD RS2005 TX VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD RS4000 TX/TX\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD RS4000 TX/TX-M\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD RS4000 TX/TX-P\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD RS4000 TX/TX VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD RS4004 TX/DTX\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD RS4004 TX/DTX VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD SMART2\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"FL MGUARD SMART2 VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"TC MGUARD RS2000 3G VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"TC MGUARD RS2000 4G ATT VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"TC MGUARD RS2000 4G VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"TC MGUARD RS2000 4G VZW VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"TC MGUARD RS4000 3G VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"TC MGUARD RS4000 4G ATT VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"TC MGUARD RS4000 4G VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"PHOENIX CONTACT\", \"product\": \"TC MGUARD RS4000 4G VZW VPN\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"8.9.3\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://cert.vde.com/en/advisories/VDE-2024-052\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An unauthenticated remote attacker can\\u00a0exploit the behavior of the\\u00a0pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to\\u00a0blocking of valid IPsec VPN peers.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"An unauthenticated remote attacker can\u0026nbsp;exploit the behavior of the\u0026nbsp;pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to\u0026nbsp;blocking of valid IPsec VPN peers.\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-770\", \"description\": \"CWE-770 Allocation of Resources Without Limits or Throttling\"}]}], \"providerMetadata\": {\"orgId\": \"270ccfa6-a436-4e77-922e-914ec3a9685c\", \"shortName\": \"CERTVDE\", \"dateUpdated\": \"2024-09-10T08:03:19.477Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2024-7734\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-10T16:00:45.691Z\", \"dateReserved\": \"2024-08-13T12:52:12.930Z\", \"assignerOrgId\": \"270ccfa6-a436-4e77-922e-914ec3a9685c\", \"datePublished\": \"2024-09-10T08:03:19.477Z\", \"assignerShortName\": \"CERTVDE\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…