VDE-2021-035
Vulnerability from csaf_phoenixcontactgmbhcokg - Published: 2021-08-11 07:59 - Updated: 2025-05-22 13:03Summary
PHOENIX CONTACT: FL MGUARD DM version 1.12.0 and 1.13.0 Improper Privilege Management
Notes
Summary: Access to the Apache web server being installed as part of the FL MGUARD DM on Microsoft Windows does not require login credentials even if configured during installation.
Impact: Attackers with network access to the Apache web server can download and therefore read mGuard configuration profiles ('ATV profiles'). Such configuration profiles may contain sensitive information, e.g. private keys associated with IPsec VPN connections.
Mitigation: Stop the ApacheMDM Windows service.
Edit file <mdm>/apache/conf/extra/httpd-mdm.conf and remove the instances of these lines for 'DocumentRoot' and alias '/atv':
#Controls who can get stuff from this server.
Require all granted
<mdm> refers to the directory in which FL MGUARD DM is installed.
Start the ApacheMDM Windows service.
Remediation: This vulnerability is fixed in FL MGUARD DM 1.13.0.1. We advise all affected FL MGUARD DM 1.12.0 and 1.13.0 users to upgrade to FL MGUARD DM 1.13.0.1 or a later version.
Additional recommendations:
- Limit network access to the Apache web server to as few network addresses as possible.
- If possible, make use of encrypted mGuard configuration profiles.
7.5 (High)
Mitigation
Stop the ApacheMDM Windows service.
Edit file <mdm>/apache/conf/extra/httpd-mdm.conf and remove the instances of these lines for 'DocumentRoot' and alias '/atv':
#Controls who can get stuff from this server.
Require all granted
<mdm> refers to the directory in which FL MGUARD DM is installed.
Start the ApacheMDM Windows service.
Vendor Fix
This vulnerability is fixed in FL MGUARD DM 1.13.0.1. We advise all affected FL MGUARD DM 1.12.0 and 1.13.0 users to upgrade to FL MGUARD DM 1.13.0.1 or a later version.
Additional recommendations:
- Limit network access to the Apache web server to as few network addresses as possible.
- If possible, make use of encrypted mGuard configuration profiles.
References
Acknowledgments
CERT@VDE
certvde.com
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination",
"urls": [
"https://certvde.com"
]
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/v1/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "Access to the Apache web server being installed as part of the FL MGUARD DM on Microsoft Windows does not require login credentials even if configured during installation.",
"title": "Summary"
},
{
"category": "description",
"text": "Attackers with network access to the Apache web server can download and therefore read mGuard configuration profiles (\u0027ATV profiles\u0027). Such configuration profiles may contain sensitive information, e.g. private keys associated with IPsec VPN connections.",
"title": "Impact"
},
{
"category": "description",
"text": "Stop the ApacheMDM Windows service.\n\nEdit file \u003cmdm\u003e/apache/conf/extra/httpd-mdm.conf and remove the instances of these lines for \u0027DocumentRoot\u0027 and alias \u0027/atv\u0027:\n\n#Controls who can get stuff from this server.\n\nRequire all granted\n\n\u003cmdm\u003e refers to the directory in which FL MGUARD DM is installed.\n\nStart the ApacheMDM Windows service.",
"title": "Mitigation"
},
{
"category": "description",
"text": "This vulnerability is fixed in FL MGUARD DM 1.13.0.1. We advise all affected FL MGUARD DM 1.12.0 and 1.13.0 users to upgrade to FL MGUARD DM 1.13.0.1 or a later version.\nAdditional recommendations:\n\n- Limit network access to the Apache web server to as few network addresses as possible.\n- If possible, make use of encrypted mGuard configuration profiles.",
"title": "Remediation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@phoenixcontact.com",
"name": "Phoenix Contact GmbH \u0026 Co. KG",
"namespace": "https://phoenixcontact.com/psirt"
},
"references": [
{
"category": "self",
"summary": "VDE-2021-035: PHOENIX CONTACT: FL MGUARD DM version 1.12.0 and 1.13.0 Improper Privilege Management - HTML",
"url": "https://certvde.com/en/advisories/VDE-2021-035"
},
{
"category": "external",
"summary": "CERT@VDE Security Advisories for PHOENIX CONTACT",
"url": "https://certvde.com/de/advisories/vendor/phoenixcontact/"
},
{
"category": "self",
"summary": "VDE-2021-035: PHOENIX CONTACT: FL MGUARD DM version 1.12.0 and 1.13.0 Improper Privilege Management - CSAF",
"url": "https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2021/vde-2021-035.json"
}
],
"title": "PHOENIX CONTACT: FL MGUARD DM version 1.12.0 and 1.13.0 Improper Privilege Management",
"tracking": {
"aliases": [
"VDE-2021-035"
],
"current_release_date": "2025-05-22T13:03:10.000Z",
"generator": {
"date": "2025-02-10T09:30:35.925Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.18"
}
},
"id": "VDE-2021-035",
"initial_release_date": "2021-08-11T07:59:00.000Z",
"revision_history": [
{
"date": "2021-08-11T07:59:00.000Z",
"number": "1",
"summary": "initial revision"
},
{
"date": "2025-02-10T09:30:00.000Z",
"number": "2",
"summary": "Update: Provider data has been corrected"
},
{
"date": "2025-05-22T13:03:10.000Z",
"number": "3",
"summary": "Fix: quotation mark"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1.12.0",
"product": {
"name": "FL MGUARD DM 1.12.0",
"product_id": "CSAFPID-51001",
"product_identification_helper": {
"model_numbers": [
"2981974"
]
}
}
},
{
"category": "product_version",
"name": "1.13.0",
"product": {
"name": "FL MGUARD DM 1.13.0",
"product_id": "CSAFPID-51002",
"product_identification_helper": {
"model_numbers": [
"2981974"
]
}
}
},
{
"category": "product_version",
"name": "1.13.0.1",
"product": {
"name": "FL MGUARD DM 1.13.0.1",
"product_id": "CSAFPID-52001",
"product_identification_helper": {
"model_numbers": [
"2981974"
]
}
}
}
],
"category": "product_name",
"name": "FL MGUARD DM"
}
],
"category": "product_family",
"name": "Software"
}
],
"category": "vendor",
"name": "PHOENIX CONTACT"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-51001",
"CSAFPID-51002"
],
"summary": "Affected products."
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-34579",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "summary",
"text": "In Phoenix Contact: FL MGUARD DM version 1.12.0 and 1.13.0 access to the Apache web server being installed as part of the FL MGUARD DM on Microsoft Windows does not require login credentials even if configured during installation.Attackers with network access to the Apache web server can download and therefore read mGuard configuration profiles (\u0027ATV profiles\u0027). Such configuration profiles may contain sensitive information, e.g. private keys associated with IPsec VPN connections.",
"title": "Summary"
}
],
"product_status": {
"fixed": [
"CSAFPID-52001"
],
"known_affected": [
"CSAFPID-51001",
"CSAFPID-51002"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Stop the ApacheMDM Windows service.\n\nEdit file \u003cmdm\u003e/apache/conf/extra/httpd-mdm.conf and remove the instances of these lines for \u0027DocumentRoot\u0027 and alias \u0027/atv\u0027:\n\n#Controls who can get stuff from this server.\n\nRequire all granted\n\n\u003cmdm\u003e refers to the directory in which FL MGUARD DM is installed.\n\nStart the ApacheMDM Windows service.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "This vulnerability is fixed in FL MGUARD DM 1.13.0.1. We advise all affected FL MGUARD DM 1.12.0 and 1.13.0 users to upgrade to FL MGUARD DM 1.13.0.1 or a later version.\nAdditional recommendations:\n\n- Limit network access to the Apache web server to as few network addresses as possible.\n- If possible, make use of encrypted mGuard configuration profiles.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-51001",
"CSAFPID-51002"
]
}
],
"title": "CVE-2021-34579"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…