Description Preview
Overview
The vulnerability affects the Apache web server component of Phoenix Contact FL MGUARD DM versions 1.12.0 and 1.13.0 running on Microsoft Windows. The authentication bypass allows remote attackers to access the web server without providing valid credentials, even when authentication has been explicitly configured during the installation process. Once accessed, attackers can download configuration profiles that may contain highly sensitive security information, including private keys used for IPsec VPN connections. This vulnerability represents a significant security risk as it could lead to unauthorized access to protected networks through compromised VPN credentials.
Remediation
Organizations using affected versions of Phoenix Contact FL MGUARD DM should:
- Update to the latest version of FL MGUARD DM as recommended by Phoenix Contact
- Implement additional network security controls to restrict access to the Apache web server
- Consider changing VPN private keys and credentials if there's any suspicion they may have been compromised
- Monitor for unauthorized access attempts to the web server
- Consider implementing network segmentation to isolate the management interface
- Contact Phoenix Contact support for specific patching instructions if updates are not immediately available
References
- VDE CERT Advisory: https://cert.vde.com/en/advisories/VDE-2021-035/
- Phoenix Contact Security Advisories
- MITRE CVE-2021-34579 Entry
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- ConstructionConstruction
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Health Care & Social AssistanceHealth Care & Social Assistance
- InformationInformation
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- ManufacturingManufacturing
- MiningMining
- Other Services (except Public Administration)Other Services (except Public Administration)
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Public AdministrationPublic Administration
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- UtilitiesUtilities
- Wholesale TradeWholesale Trade