Required CVE Record Information
Description
Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allow UDP packets to bypass the filter rules and access the solely connected device behind the MGUARD which can be used for flooding attacks.
CVSS 1 Total
Score | Severity | Version | Vector String |
---|---|---|---|
5.3 | MEDIUM | 3.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
Product Status
Learn moreVersions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
Versions 1 Total
Default Status: unaffected
affected
References 1 Total
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 1 Total
- https://cert.vde.com/en/advisories/VDE-2023-010/ x_transferred