9.1
CVSSv3

CVE-2020-12523

Published: 17/12/2020 Updated: 21/12/2020
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

On Phoenix Contact mGuard Devices versions prior to 8.8.3 LAN ports get functional after reboot even if they are disabled in the device configuration. For mGuard devices with integrated switch on the LAN side, single switch ports can be disabled by device configuration. After a reboot these ports get functional independent from their configuration setting: Missing Initialization of Resource

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

phoenixcontact tc_mguard_rs4000_4g_vzw_vpn_firmware

phoenixcontact tc_mguard_rs4000_4g_att_vpn_firmware

phoenixcontact fl_mguard_rs4004_tx\\/dtx_firmware

phoenixcontact fl_mguard_rs4004_tx\\/dtx_vpn_firmware

phoenixcontact tc_mguard_rs4000_3g_vpn_firmware -

phoenixcontact tc_mguard_rs4000_4g_vpn_firmware

phoenixcontact innominate_mguard_rs4000_4tx\\/tx_firmware

phoenixcontact innominate_mguard_rs4000_4tx\\/tx_vpn_firmware

phoenixcontact innominate_mguard_rs4000_4tx\\/3g\\/tx_vpn_firmware