CVE-2021-34579

In Phoenix Contact: FL MGUARD DM version 1.12.0 and 1.13.0 access to the Apache web server being installed as part of the FL MGUARD DM on Microsoft Windows does not require login credentials even if configured during installation.Attackers with network access to the Apache web server can download and therefore read mGuard configuration profiles (“ATV profiles”). Such configuration profiles may contain sensitive information, e.g. private keys associated with IPsec VPN connections.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:phoenixcontact:fl_mguard_dm:1.12.0:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:fl_mguard_dm:1.13.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:10

Type Values Removed Values Added
References () https://cert.vde.com/en/advisories/VDE-2021-035/ - Third Party Advisory () https://cert.vde.com/en/advisories/VDE-2021-035/ - Third Party Advisory

Information

Published : 2022-11-09 17:15

Updated : 2024-11-21 06:10


NVD link : CVE-2021-34579

Mitre link : CVE-2021-34579

CVE.ORG link : CVE-2021-34579


JSON object : View

Products Affected

phoenixcontact

  • fl_mguard_dm
CWE
CWE-269

Improper Privilege Management

NVD-CWE-noinfo