var-201705-3746
Vulnerability from variot

A Resource Exhaustion issue was discovered in Phoenix Contact GmbH mGuard firmware versions 8.3.0 to 8.4.2. An attacker may compromise the device's availability by performing multiple initial VPN requests. Phoenix Contact mGuard is a security device for unauthorized access and installation of Phoenix Contact's protection system. Phoenix Contact mGuard denial of service vulnerability. An attacker could exploit the vulnerability to cause a denial of service. Attackers can exploit these issues to perform unauthorized actions or cause denial-of-service conditions. mGuard firmware versions 8.3.0 through 8.4.2 are vulnerable. Phoenix Contact GmbH mGuard is a set of equipment security management software applied in the field of industrial Ethernet from Phoenix Contact Group in Germany

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201705-3746",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "phoenix contact",
        "version": "8.3.1"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "phoenix contact",
        "version": "8.4.2"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "phoenix contact",
        "version": "8.3.0"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "phoenix contact",
        "version": "8.3.2"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "phoenix contact",
        "version": "8.4.1"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "phoenix contact",
        "version": "8.4.0"
      },
      {
        "model": "mguard",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "phoenix contact",
        "version": "firmware  8.3.0 to  8.4.2"
      },
      {
        "model": "mguard",
        "scope": "gte",
        "trust": 0.6,
        "vendor": "phoenix contact",
        "version": "8.3.0,\u003c=8.4.2"
      },
      {
        "model": "contact mguard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "8.4.2"
      },
      {
        "model": "contact mguard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "8.4.1"
      },
      {
        "model": "contact mguard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "8.4.0"
      },
      {
        "model": "contact mguard",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "8.3.0"
      },
      {
        "model": "contact mguard",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "phoenix",
        "version": "8.5.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "mguard",
        "version": "8.3.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "mguard",
        "version": "8.3.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "mguard",
        "version": "8.3.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "mguard",
        "version": "8.4.0"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "mguard",
        "version": "8.4.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "mguard",
        "version": "8.4.2"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "fb08d782-bab9-490f-be5a-5b968518646e"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-09580"
      },
      {
        "db": "BID",
        "id": "98416"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-004201"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-925"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7935"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:pheonixcontact-software:mguard",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-004201"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The vendor reported this issue.",
    "sources": [
      {
        "db": "BID",
        "id": "98416"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2017-7935",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2017-7935",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2017-09580",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "fb08d782-bab9-490f-be5a-5b968518646e",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.8,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "VHN-116138",
            "impactScore": 6.9,
            "integrityImpact": "NONE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2017-7935",
            "impactScore": 3.6,
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2017-7935",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2017-7935",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2017-09580",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201704-925",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "fb08d782-bab9-490f-be5a-5b968518646e",
            "trust": 0.2,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-116138",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "fb08d782-bab9-490f-be5a-5b968518646e"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-09580"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116138"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-004201"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-925"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7935"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A Resource Exhaustion issue was discovered in Phoenix Contact GmbH mGuard firmware versions 8.3.0 to 8.4.2. An attacker may compromise the device\u0027s availability by performing multiple initial VPN requests. Phoenix Contact mGuard is a security device for unauthorized access and installation of Phoenix Contact\u0027s protection system. Phoenix Contact mGuard denial of service vulnerability. An attacker could exploit the vulnerability to cause a denial of service. \nAttackers can exploit these issues to perform unauthorized  actions or cause  denial-of-service conditions. \nmGuard firmware versions 8.3.0 through 8.4.2 are vulnerable. Phoenix Contact GmbH mGuard is a set of equipment security management software applied in the field of industrial Ethernet from Phoenix Contact Group in Germany",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2017-7935"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-004201"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-09580"
      },
      {
        "db": "BID",
        "id": "98416"
      },
      {
        "db": "IVD",
        "id": "fb08d782-bab9-490f-be5a-5b968518646e"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116138"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2017-7935",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-17-131-01",
        "trust": 2.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-925",
        "trust": 0.9
      },
      {
        "db": "BID",
        "id": "98416",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-09580",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-004201",
        "trust": 0.8
      },
      {
        "db": "IVD",
        "id": "FB08D782-BAB9-490F-BE5A-5B968518646E",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-116138",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "fb08d782-bab9-490f-be5a-5b968518646e"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-09580"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116138"
      },
      {
        "db": "BID",
        "id": "98416"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-004201"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-925"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7935"
      }
    ]
  },
  "id": "VAR-201705-3746",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "fb08d782-bab9-490f-be5a-5b968518646e"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-09580"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116138"
      }
    ],
    "trust": 1.54545453
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "fb08d782-bab9-490f-be5a-5b968518646e"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-09580"
      }
    ]
  },
  "last_update_date": "2024-11-23T21:54:02.336000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "https://www.phoenixcontact.com/online/portal/pc"
      },
      {
        "title": "Patch for Phoenix Contact mGuard Denial of Service Vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/95390"
      },
      {
        "title": "Phoenix Contact GmbH mGuard Remediation of resource management error vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=100392"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-09580"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-004201"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-925"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-400",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-116138"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-004201"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7935"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-131-01"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7935"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7935"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/bid/98416"
      },
      {
        "trust": 0.3,
        "url": "https://www.phoenixcontact.com/online/portal/pc"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2017-09580"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116138"
      },
      {
        "db": "BID",
        "id": "98416"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-004201"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-925"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7935"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "fb08d782-bab9-490f-be5a-5b968518646e"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-09580"
      },
      {
        "db": "VULHUB",
        "id": "VHN-116138"
      },
      {
        "db": "BID",
        "id": "98416"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2017-004201"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-925"
      },
      {
        "db": "NVD",
        "id": "CVE-2017-7935"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-06-15T00:00:00",
        "db": "IVD",
        "id": "fb08d782-bab9-490f-be5a-5b968518646e"
      },
      {
        "date": "2017-06-16T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-09580"
      },
      {
        "date": "2017-05-19T00:00:00",
        "db": "VULHUB",
        "id": "VHN-116138"
      },
      {
        "date": "2017-05-11T00:00:00",
        "db": "BID",
        "id": "98416"
      },
      {
        "date": "2017-06-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-004201"
      },
      {
        "date": "2017-04-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201704-925"
      },
      {
        "date": "2017-05-19T03:29:00.637000",
        "db": "NVD",
        "id": "CVE-2017-7935"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2017-06-15T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2017-09580"
      },
      {
        "date": "2019-10-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-116138"
      },
      {
        "date": "2017-05-11T00:00:00",
        "db": "BID",
        "id": "98416"
      },
      {
        "date": "2017-06-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2017-004201"
      },
      {
        "date": "2019-10-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201704-925"
      },
      {
        "date": "2024-11-21T03:32:59.963000",
        "db": "NVD",
        "id": "CVE-2017-7935"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-925"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Phoenix Contact mGuard Denial of service vulnerability",
    "sources": [
      {
        "db": "IVD",
        "id": "fb08d782-bab9-490f-be5a-5b968518646e"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2017-09580"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Resource management error",
    "sources": [
      {
        "db": "IVD",
        "id": "fb08d782-bab9-490f-be5a-5b968518646e"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201704-925"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…