| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2024-43393 | Phoenix Contact: Configuration changes of the firewall services can lead to DoS in MGUARD devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.1 | 2024-09-10 08:45:10 | Deep Dive |
| CVE-2024-43392 | Phoenix Contact: Firewall reconfiguration through the FW_environment variables in MGUARD devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.1 | 2024-09-10 08:44:56 | Deep Dive |
| CVE-2024-43391 | Phoenix Contact: Firewall reconfiguration through the FW_PORTFORWARDING.SRC_IP in MGUARD devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.1 | 2024-09-10 08:44:43 | Deep Dive |
| CVE-2024-43390 | Phoenix Contact: Firewall reconfiguration due to improper input validation in MGUARD devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.1 | 2024-09-10 08:44:31 | Deep Dive |
| CVE-2024-43389 | Phoenix Contact: OSPF reconfiguration due to improper input validation in MGUARD devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.1 | 2024-09-10 08:44:19 | Deep Dive |
| CVE-2024-43388 | Phoenix Contact: SNMP reconfiguration due to improper input validation in MGUARD devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.8 | 2024-09-10 08:44:07 | Deep Dive |
| CVE-2024-43387 | Phoenix Contact: Access files due to improper neutralization of special elements in MGUARD devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.8 | 2024-09-10 08:43:54 | Deep Dive |
| CVE-2024-43386 | Phoenix Contact: OS command execution through EMAIL_NOTIFICATION.TO in mGuard devices. | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.8 | 2024-09-10 08:43:41 | Deep Dive |
| CVE-2024-43385 | Phoenix Contact: OS command execution through PROXY_HTTP_PORT in mGuard devices | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.8 | 2024-09-10 08:43:26 | Deep Dive |
| CVE-2024-7699 | Phoenix Contact: OS command execution in MGUARD products | PHOENIX CONTACT | FL MGUARD 2102 | High | 8.8 | 2024-09-10 08:42:56 | Deep Dive |
| CVE-2024-7698 | Phoenix Contact: Access to CSRF tokens of higher privileged users in MGUARD products | PHOENIX CONTACT | FL MGUARD 2102 | Medium | 5.7 | 2024-09-10 08:42:43 | Deep Dive |
| CVE-2024-7734 | Phoenix Contact: Multiple mGuard devices are vulnerable to a drain of open file descriptors. | PHOENIX CONTACT | FL MGUARD 2102 | Medium | 5.3 | 2024-09-10 08:03:19 | Deep Dive |
| CVE-2023-2673 | PHOENIX CONTACT: FL/TC MGUARD prone to Improper Input Validation | PHOENIX CONTACT | FL MGUARD 2102 | Medium | 5.3 | 2023-06-13 06:16:19 | Deep Dive |
| CVE-2022-3480 | Denial-of-Service vulnerability in PHOENIX CONTACT mGuard product family | PHOENIX CONTACT | FL MGUARD CENTERPORT | High | 7.5 | 2022-11-15 10:58:26 | Deep Dive |
| CVE-2021-34579 | PHOENIX CONTACT: FL MGUARD DM version 1.12.0 and 1.13.0 Improper Privilege Management | PHOENIX CONTACT | FL MGUARD DM (2981974) | High | 7.5 | 2022-11-09 16:28:33 | Deep Dive |
| CVE-2021-34598 | Phoenix Contact: FL MGUARD lack of memory release in remote logging functionality | PHOENIX CONTACT | FL MGUARD | High | 7.5 | 2021-11-10 11:22:06 | Deep Dive |
| CVE-2021-34582 | Phoenix Contact: FL MGUARD XSS through web-based management and REST API | PHOENIX CONTACT | FL MGUARD | Medium | 4.8 | 2021-11-10 11:22:05 | Deep Dive |
| CVE-2020-12523 | Phoenix Contact mGuard Devices versions before 8.8.3: LAN ports get functional after reboot even if they are disabled in the device configuration | Phoenix Contact | TC MGUARD RS4000 4G VZW VPN (1010461) | Medium | 5.4 | 2020-12-17 22:43:15 | Deep Dive |
| CVE-2018-5441 | PHOENIX CONTACT mGuard 安全漏洞 | - | PHOENIX CONTACT mGuard | 高危 | - | 2018-01-30 20:00:00 | Deep Dive |
| CVE-2017-7937 | Phoenix Contact GmbH mGuard 授权问题漏洞 | - | Phoenix Contact GmbH mGuard | 中危 | - | 2017-05-19 02:43:00 | Deep Dive |