8.1

CVE-2024-43393

A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_INCOMING.FROM_IP FW_INCOMING.IN_IP FW_OUTGOING.FROM_IP FW_OUTGOING.IN_IP FW_RULESETS.FROM_IP FW_RULESETS.IN_IP  environment variable which can lead to a DoS.

Data is provided by the National Vulnerability Database (NVD)
PhoenixcontactFl Mguard 4305 Firmware Version < 10.4.1
   PhoenixcontactFl Mguard 4305 Version-
PhoenixcontactFl Mguard 4302 Firmware Version < 10.4.1
   PhoenixcontactFl Mguard 4302 Version-
PhoenixcontactFl Mguard 2105 Firmware Version < 10.4.1
   PhoenixcontactFl Mguard 2105 Version-
PhoenixcontactFl Mguard 2102 Firmware Version < 10.4.1
   PhoenixcontactFl Mguard 2102 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.34% 0.563
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.1 2.8 5.2
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
info@cert.vde.com 8.1 2.8 5.2
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.