var-201705-3747
Vulnerability from variot
An Improper Authentication issue was discovered in Phoenix Contact GmbH mGuard firmware versions 8.3.0 to 8.4.2. An attacker may be able to gain unauthorized access to the user firewall when RADIUS servers are unreachable. Phoenix Contact mGuard is a security device for unauthorized access and installation of Phoenix Contact's protection system. An attacker could exploit the vulnerability to perform an unauthorized operation or cause a denial of service. mGuard firmware versions 8.3.0 through 8.4.2 are vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201705-3747",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "mguard",
"scope": "eq",
"trust": 1.6,
"vendor": "phoenix contact",
"version": "8.3.1"
},
{
"model": "mguard",
"scope": "eq",
"trust": 1.6,
"vendor": "phoenix contact",
"version": "8.4.2"
},
{
"model": "mguard",
"scope": "eq",
"trust": 1.6,
"vendor": "phoenix contact",
"version": "8.3.0"
},
{
"model": "mguard",
"scope": "eq",
"trust": 1.6,
"vendor": "phoenix contact",
"version": "8.3.2"
},
{
"model": "mguard",
"scope": "eq",
"trust": 1.6,
"vendor": "phoenix contact",
"version": "8.4.1"
},
{
"model": "mguard",
"scope": "eq",
"trust": 1.6,
"vendor": "phoenix contact",
"version": "8.4.0"
},
{
"model": "mguard",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "firmware 8.3.0 to 8.4.2"
},
{
"model": "mguard",
"scope": "gte",
"trust": 0.6,
"vendor": "phoenix contact",
"version": "8.3.0,\u003c=8.4.2"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.4.2"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.4.1"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.4.0"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.3.0"
},
{
"model": "contact mguard",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.5.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard",
"version": "8.3.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard",
"version": "8.3.1"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard",
"version": "8.3.2"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard",
"version": "8.4.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard",
"version": "8.4.1"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard",
"version": "8.4.2"
}
],
"sources": [
{
"db": "IVD",
"id": "f9fe676d-7613-4f3c-8ffa-ef72a94153dd"
},
{
"db": "CNVD",
"id": "CNVD-2017-09583"
},
{
"db": "BID",
"id": "98416"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004202"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-923"
},
{
"db": "NVD",
"id": "CVE-2017-7937"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:pheonixcontact-software:mguard",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-004202"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "98416"
}
],
"trust": 0.3
},
"cve": "CVE-2017-7937",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2017-7937",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.4,
"id": "CNVD-2017-09583",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "LOW",
"trust": 0.6,
"vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.4,
"id": "f9fe676d-7613-4f3c-8ffa-ef72a94153dd",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "LOW",
"trust": 0.2,
"vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-116140",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 2.2,
"id": "CVE-2017-7937",
"impactScore": 1.4,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2017-7937",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2017-7937",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2017-09583",
"trust": 0.6,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-201704-923",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "f9fe676d-7613-4f3c-8ffa-ef72a94153dd",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-116140",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "f9fe676d-7613-4f3c-8ffa-ef72a94153dd"
},
{
"db": "CNVD",
"id": "CNVD-2017-09583"
},
{
"db": "VULHUB",
"id": "VHN-116140"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004202"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-923"
},
{
"db": "NVD",
"id": "CVE-2017-7937"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An Improper Authentication issue was discovered in Phoenix Contact GmbH mGuard firmware versions 8.3.0 to 8.4.2. An attacker may be able to gain unauthorized access to the user firewall when RADIUS servers are unreachable. Phoenix Contact mGuard is a security device for unauthorized access and installation of Phoenix Contact\u0027s protection system. An attacker could exploit the vulnerability to perform an unauthorized operation or cause a denial of service. \nmGuard firmware versions 8.3.0 through 8.4.2 are vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-7937"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004202"
},
{
"db": "CNVD",
"id": "CNVD-2017-09583"
},
{
"db": "BID",
"id": "98416"
},
{
"db": "IVD",
"id": "f9fe676d-7613-4f3c-8ffa-ef72a94153dd"
},
{
"db": "VULHUB",
"id": "VHN-116140"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-7937",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-17-131-01",
"trust": 2.8
},
{
"db": "CNNVD",
"id": "CNNVD-201704-923",
"trust": 0.9
},
{
"db": "BID",
"id": "98416",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2017-09583",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004202",
"trust": 0.8
},
{
"db": "IVD",
"id": "F9FE676D-7613-4F3C-8FFA-EF72A94153DD",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-116140",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "f9fe676d-7613-4f3c-8ffa-ef72a94153dd"
},
{
"db": "CNVD",
"id": "CNVD-2017-09583"
},
{
"db": "VULHUB",
"id": "VHN-116140"
},
{
"db": "BID",
"id": "98416"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004202"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-923"
},
{
"db": "NVD",
"id": "CVE-2017-7937"
}
]
},
"id": "VAR-201705-3747",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "f9fe676d-7613-4f3c-8ffa-ef72a94153dd"
},
{
"db": "CNVD",
"id": "CNVD-2017-09583"
},
{
"db": "VULHUB",
"id": "VHN-116140"
}
],
"trust": 1.54545453
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "f9fe676d-7613-4f3c-8ffa-ef72a94153dd"
},
{
"db": "CNVD",
"id": "CNVD-2017-09583"
}
]
},
"last_update_date": "2024-11-23T21:54:02.297000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.phoenixcontact.com/online/portal/pc"
},
{
"title": "Patch for Phoenix Contact mGuard Security Bypass and Denial of Service Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/95389"
},
{
"title": "Phoenix Contact GmbH mGuard Remediation measures for authorization problem vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=100391"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-09583"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004202"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-923"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-116140"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004202"
},
{
"db": "NVD",
"id": "CVE-2017-7937"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-131-01"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7937"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7937"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/98416"
},
{
"trust": 0.3,
"url": "https://www.phoenixcontact.com/online/portal/pc"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-09583"
},
{
"db": "VULHUB",
"id": "VHN-116140"
},
{
"db": "BID",
"id": "98416"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004202"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-923"
},
{
"db": "NVD",
"id": "CVE-2017-7937"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "f9fe676d-7613-4f3c-8ffa-ef72a94153dd"
},
{
"db": "CNVD",
"id": "CNVD-2017-09583"
},
{
"db": "VULHUB",
"id": "VHN-116140"
},
{
"db": "BID",
"id": "98416"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004202"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-923"
},
{
"db": "NVD",
"id": "CVE-2017-7937"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-06-15T00:00:00",
"db": "IVD",
"id": "f9fe676d-7613-4f3c-8ffa-ef72a94153dd"
},
{
"date": "2017-06-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-09583"
},
{
"date": "2017-05-19T00:00:00",
"db": "VULHUB",
"id": "VHN-116140"
},
{
"date": "2017-05-11T00:00:00",
"db": "BID",
"id": "98416"
},
{
"date": "2017-06-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-004202"
},
{
"date": "2017-04-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-923"
},
{
"date": "2017-05-19T03:29:00.683000",
"db": "NVD",
"id": "CVE-2017-7937"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-06-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-09583"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-116140"
},
{
"date": "2017-05-11T00:00:00",
"db": "BID",
"id": "98416"
},
{
"date": "2017-06-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-004202"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-923"
},
{
"date": "2024-11-21T03:33:00.230000",
"db": "NVD",
"id": "CVE-2017-7937"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-923"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Phoenix Contact GmbH mGuard Firmware authentication vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-004202"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-923"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…