SARA / Free Tools / CVE / CVE-2023-2673

CVE-2023-2673 — Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family i

Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allow UDP packets to bypass the filter rules and access the solely connected device behind the MGUARD which can be used for flooding attacks.

CVSS
5.3 MEDIUM
EPSS
2.00% (top 94.10%)
CWE
CWE-1287
Published
2023-06-13T06:16:18.557Z
Last modified
2025-01-03T01:57:54.039Z
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

01What is this vulnerability?

Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allow UDP packets to bypass the filter rules and access the solely connected device behind the MGUARD which can be used for flooding attacks.

02Affected products

VendorProductVersions
PHOENIX CONTACTFL MGUARD 21020
PHOENIX CONTACTFL MGUARD 4102 PCI0
PHOENIX CONTACTFL MGUARD 4102 PCIE0
PHOENIX CONTACTFL MGUARD 43020
PHOENIX CONTACTFL MGUARD CENTERPORT0
PHOENIX CONTACTFL MGUARD CENTERPORT VPN1000 — 0
PHOENIX CONTACTFL MGUARD CORE TX0
PHOENIX CONTACTFL MGUARD CORE TX VPN0
PHOENIX CONTACTFL MGUARD DELTA TX/TX0
PHOENIX CONTACTFL MGUARD DELTA TX/TX VPN0
PHOENIX CONTACTFL MGUARD GT/GT0
PHOENIX CONTACTFL MGUARD GT/GT VPN0
PHOENIX CONTACTFL MGUARD PCI40000
PHOENIX CONTACTFL MGUARD PCI4000 VPN0
PHOENIX CONTACTFL MGUARD PCIE40000
PHOENIX CONTACTFL MGUARD PCIE4000 VPN0
PHOENIX CONTACTFL MGUARD RS2000 TX/TXB — 0
PHOENIX CONTACTFL MGUARD RS2000 TX/TX VPN0
PHOENIX CONTACTFL MGUARD RS2005 TX VPN0
PHOENIX CONTACTFL MGUARD RS4000 TX/TXM — 0
PHOENIX CONTACTFL MGUARD RS4000 TX/TXP — 0
PHOENIX CONTACTFL MGUARD RS4000 TX/TX VPN0
PHOENIX CONTACTFL MGUARD RS4000 TX/TX VPN0
PHOENIX CONTACTFL MGUARD RS4004 TX/DTX0
PHOENIX CONTACTFL MGUARD RS4004 TX/DTX VPN0
PHOENIX CONTACTFL MGUARD SMART20
PHOENIX CONTACTFL MGUARD SMART2 VPN0

03Active exploitation status

Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.

04Recommended remediation

05Technical details

For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.

06Detection signatures

Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:

Open in Sigma generator →

07Related CVEs

No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.

08Timeline

09References

Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →