VAR-201705-3747
Vulnerability from variot - Updated: 2023-12-18 12:51An Improper Authentication issue was discovered in Phoenix Contact GmbH mGuard firmware versions 8.3.0 to 8.4.2. An attacker may be able to gain unauthorized access to the user firewall when RADIUS servers are unreachable. Phoenix Contact mGuard is a security device for unauthorized access and installation of Phoenix Contact's protection system. An attacker could exploit the vulnerability to perform an unauthorized operation or cause a denial of service. mGuard firmware versions 8.3.0 through 8.4.2 are vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201705-3747",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "mguard",
"scope": "eq",
"trust": 1.6,
"vendor": "phoenix contact",
"version": "8.3.1"
},
{
"model": "mguard",
"scope": "eq",
"trust": 1.6,
"vendor": "phoenix contact",
"version": "8.4.2"
},
{
"model": "mguard",
"scope": "eq",
"trust": 1.6,
"vendor": "phoenix contact",
"version": "8.4.1"
},
{
"model": "mguard",
"scope": "eq",
"trust": 1.6,
"vendor": "phoenix contact",
"version": "8.4.0"
},
{
"model": "mguard",
"scope": "eq",
"trust": 1.6,
"vendor": "phoenix contact",
"version": "8.3.0"
},
{
"model": "mguard",
"scope": "eq",
"trust": 1.6,
"vendor": "phoenix contact",
"version": "8.3.2"
},
{
"model": "mguard",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "firmware 8.3.0 to 8.4.2"
},
{
"model": "mguard",
"scope": "gte",
"trust": 0.6,
"vendor": "phoenix contact",
"version": "8.3.0,\u003c=8.4.2"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.4.2"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.4.1"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.4.0"
},
{
"model": "contact mguard",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.3.0"
},
{
"model": "contact mguard",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "8.5.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard",
"version": "8.3.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard",
"version": "8.3.1"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard",
"version": "8.3.2"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard",
"version": "8.4.0"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard",
"version": "8.4.1"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "mguard",
"version": "8.4.2"
}
],
"sources": [
{
"db": "IVD",
"id": "f9fe676d-7613-4f3c-8ffa-ef72a94153dd"
},
{
"db": "CNVD",
"id": "CNVD-2017-09583"
},
{
"db": "BID",
"id": "98416"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004202"
},
{
"db": "NVD",
"id": "CVE-2017-7937"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-923"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenix_contact_gmbh:mguard_firmware:8.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:phoenix_contact_gmbh:mguard_firmware:8.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:phoenix_contact_gmbh:mguard_firmware:8.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:phoenix_contact_gmbh:mguard_firmware:8.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:phoenix_contact_gmbh:mguard_firmware:8.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:phoenix_contact_gmbh:mguard_firmware:8.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenix_contact_gmbh:mguard:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2017-7937"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "98416"
}
],
"trust": 0.3
},
"cve": "CVE-2017-7937",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.3,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2017-7937",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.4,
"id": "CNVD-2017-09583",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "LOW",
"trust": 0.6,
"vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "NONE",
"exploitabilityScore": 3.4,
"id": "f9fe676d-7613-4f3c-8ffa-ef72a94153dd",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "LOW",
"trust": 0.2,
"vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.9 [IVD]"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "VHN-116140",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"exploitabilityScore": 2.2,
"impactScore": 1.4,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.0"
},
{
"attackComplexity": "High",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 4.0,
"baseSeverity": "Medium",
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2017-7937",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Changed",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2017-7937",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2017-09583",
"trust": 0.6,
"value": "LOW"
},
{
"author": "CNNVD",
"id": "CNNVD-201704-923",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "f9fe676d-7613-4f3c-8ffa-ef72a94153dd",
"trust": 0.2,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-116140",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "f9fe676d-7613-4f3c-8ffa-ef72a94153dd"
},
{
"db": "CNVD",
"id": "CNVD-2017-09583"
},
{
"db": "VULHUB",
"id": "VHN-116140"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004202"
},
{
"db": "NVD",
"id": "CVE-2017-7937"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-923"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "An Improper Authentication issue was discovered in Phoenix Contact GmbH mGuard firmware versions 8.3.0 to 8.4.2. An attacker may be able to gain unauthorized access to the user firewall when RADIUS servers are unreachable. Phoenix Contact mGuard is a security device for unauthorized access and installation of Phoenix Contact\u0027s protection system. An attacker could exploit the vulnerability to perform an unauthorized operation or cause a denial of service. \nmGuard firmware versions 8.3.0 through 8.4.2 are vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2017-7937"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004202"
},
{
"db": "CNVD",
"id": "CNVD-2017-09583"
},
{
"db": "BID",
"id": "98416"
},
{
"db": "IVD",
"id": "f9fe676d-7613-4f3c-8ffa-ef72a94153dd"
},
{
"db": "VULHUB",
"id": "VHN-116140"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2017-7937",
"trust": 3.6
},
{
"db": "ICS CERT",
"id": "ICSA-17-131-01",
"trust": 2.8
},
{
"db": "CNNVD",
"id": "CNNVD-201704-923",
"trust": 0.9
},
{
"db": "BID",
"id": "98416",
"trust": 0.9
},
{
"db": "CNVD",
"id": "CNVD-2017-09583",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004202",
"trust": 0.8
},
{
"db": "IVD",
"id": "F9FE676D-7613-4F3C-8FFA-EF72A94153DD",
"trust": 0.2
},
{
"db": "VULHUB",
"id": "VHN-116140",
"trust": 0.1
}
],
"sources": [
{
"db": "IVD",
"id": "f9fe676d-7613-4f3c-8ffa-ef72a94153dd"
},
{
"db": "CNVD",
"id": "CNVD-2017-09583"
},
{
"db": "VULHUB",
"id": "VHN-116140"
},
{
"db": "BID",
"id": "98416"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004202"
},
{
"db": "NVD",
"id": "CVE-2017-7937"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-923"
}
]
},
"id": "VAR-201705-3747",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "f9fe676d-7613-4f3c-8ffa-ef72a94153dd"
},
{
"db": "CNVD",
"id": "CNVD-2017-09583"
},
{
"db": "VULHUB",
"id": "VHN-116140"
}
],
"trust": 1.54545453
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.8
}
],
"sources": [
{
"db": "IVD",
"id": "f9fe676d-7613-4f3c-8ffa-ef72a94153dd"
},
{
"db": "CNVD",
"id": "CNVD-2017-09583"
}
]
},
"last_update_date": "2023-12-18T12:51:13.425000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.phoenixcontact.com/online/portal/pc"
},
{
"title": "Patch for Phoenix Contact mGuard Security Bypass and Denial of Service Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/95389"
},
{
"title": "Phoenix Contact GmbH mGuard Remediation measures for authorization problem vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=100391"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-09583"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004202"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-923"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-287",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-116140"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004202"
},
{
"db": "NVD",
"id": "CVE-2017-7937"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-17-131-01"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-7937"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-7937"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/98416"
},
{
"trust": 0.3,
"url": "https://www.phoenixcontact.com/online/portal/pc"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2017-09583"
},
{
"db": "VULHUB",
"id": "VHN-116140"
},
{
"db": "BID",
"id": "98416"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004202"
},
{
"db": "NVD",
"id": "CVE-2017-7937"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-923"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "f9fe676d-7613-4f3c-8ffa-ef72a94153dd"
},
{
"db": "CNVD",
"id": "CNVD-2017-09583"
},
{
"db": "VULHUB",
"id": "VHN-116140"
},
{
"db": "BID",
"id": "98416"
},
{
"db": "JVNDB",
"id": "JVNDB-2017-004202"
},
{
"db": "NVD",
"id": "CVE-2017-7937"
},
{
"db": "CNNVD",
"id": "CNNVD-201704-923"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-06-15T00:00:00",
"db": "IVD",
"id": "f9fe676d-7613-4f3c-8ffa-ef72a94153dd"
},
{
"date": "2017-06-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-09583"
},
{
"date": "2017-05-19T00:00:00",
"db": "VULHUB",
"id": "VHN-116140"
},
{
"date": "2017-05-11T00:00:00",
"db": "BID",
"id": "98416"
},
{
"date": "2017-06-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-004202"
},
{
"date": "2017-05-19T03:29:00.683000",
"db": "NVD",
"id": "CVE-2017-7937"
},
{
"date": "2017-04-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-923"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2017-06-15T00:00:00",
"db": "CNVD",
"id": "CNVD-2017-09583"
},
{
"date": "2019-10-09T00:00:00",
"db": "VULHUB",
"id": "VHN-116140"
},
{
"date": "2017-05-11T00:00:00",
"db": "BID",
"id": "98416"
},
{
"date": "2017-06-20T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2017-004202"
},
{
"date": "2019-10-09T23:30:01.593000",
"db": "NVD",
"id": "CVE-2017-7937"
},
{
"date": "2019-10-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201704-923"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-923"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Phoenix Contact GmbH mGuard Firmware authentication vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2017-004202"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "authorization issue",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201704-923"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…