Phoenix Contact, Innominate Update Firmware

Thursday, September 7, 2017 @ 03:09 PM gHale


Phoenix Contact and Innominate Security Technologies released new firmware to mitigate a null pointer dereference vulnerability in its mGuard firmware, according to a report with ICS-CERT.

Successful exploitation of this remotely exploitable vulnerability, self-reported by Phoenix Contact, could allow attackers to cause a remote denial of service and force a restart of all IPSec connections.

RELATED STORIES
ALC Patches XXE Vulnerability
Moxa Updates SoftCMS Live Viewer
Fix OPW Fuel Management Systems
Siemens Clears Switched Ethernet Hole

The following versions of mGuard firmware versions 8.0.0 to 8.5.1, running on these mGuard Network Security Appliances, are affected:
• FL MGUARD RS4000 TX/TX VPN
• FL MGUARD GT/GT
• FL MGUARD GT/GT VPN
• FL MGUARD RS4000 TX/TX
• FL MGUARD SMART2 VPN
• FL MGUARD SMART2
• FL MGUARD RS2000 TX/TX VPN
• FL MGUARD DELTA TX/TX
• FL MGUARD DELTA TX/TX VPN
• FL MGUARD PCI4000
• FL MGUARD PCI4000 VPN
• FL MGUARD PCIE4000 VPN
• FL MGUARD RS2005 TX VPN
• FL MGUARD RS4004 TX/DTX
• FL MGUARD RS4004 TX/DTX VPN
• FL MGUARD RS4000 TX/TX-P
• FL MGUARD RS4000 TX/TX VPN-M
• FL MGUARD CENTERPORT
• FL MGUARD RS
• FL MGUARD RS VPN ANALOG
• TC MGUARD RS2000 3G VPN
• TC MGUARD RS4000 3G VPN
• TC MGUARD RS2000 4G VPN
• TC MGUARD RS4000 4G VPN

No known public exploits specifically target this vulnerability. An attacker with low skill level could leverage the vulnerability.

Openswan 2.6.39 and earlier, used in the mGuard firmware version 8.0.0 to 8.5.1, allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads.

CVE-2013-6466 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.5.

The product sees use in the communications, critical manufacturing and information technology sectors. It also sees action on a global basis.

Phoenix Contact and Innominate Security Technologies recommend all users running mGuard devices with affected firmware versions to update to firmware Version 8.5.2 or higher, which fixes this vulnerability. Links to updates and additional information can be found in the CERT@VDE advisory.



Leave a Reply

You must be logged in to post a comment.