CVE-2022-3480

Denial-of-Service vulnerability in PHOENIX CONTACT mGuard product family

Description

A remote, unauthenticated attacker could cause a denial-of-service of PHOENIX CONTACT FL MGUARD and TC MGUARD devices below version 8.9.0 by sending a larger number of unauthenticated HTTPS connections originating from different source IP’s. Configuring firewall limits for incoming connections cannot prevent the issue.

Remediation

Solution:

  • Upgrade to firmware version >= 8.9.0

Category

7.5
CVSS
Severity: High
CVSS 3.1 •
EPSS 0.47%
Third-Party Advisory vde.com
Affected: PHOENIX CONTACT FL MGUARD CENTERPORT
Affected: PHOENIX CONTACT FL MGUARD CENTERPORT VPN-1000
Affected: PHOENIX CONTACT FL MGUARD CORE TX
Affected: PHOENIX CONTACT FL MGUARD CORE TX VPN
Affected: PHOENIX CONTACT FL MGUARD DELTA TX/TX
Affected: PHOENIX CONTACT FL MGUARD DELTA TX/TX VPN
Affected: PHOENIX CONTACT FL MGUARD GT/GT
Affected: PHOENIX CONTACT FL MGUARD GT/GT VPN
Affected: PHOENIX CONTACT FL MGUARD PCI4000
Affected: PHOENIX CONTACT FL MGUARD PCI4000 VPN
Affected: PHOENIX CONTACT FL MGUARD PCIE4000
Affected: PHOENIX CONTACT FL MGUARD PCIE4000 VPN
Affected: PHOENIX CONTACT FL MGUARD RS2000 TX/TX-B
Affected: PHOENIX CONTACT FL MGUARD RS2000 TX/TX VPN
Affected: PHOENIX CONTACT FL MGUARD RS2005 TX VPN
Affected: PHOENIX CONTACT FL MGUARD RS4000 TX/TX
Affected: PHOENIX CONTACT FL MGUARD RS4000 TX/TX-M
Affected: PHOENIX CONTACT FL MGUARD RS4000 TX/TX-P
Affected: PHOENIX CONTACT FL MGUARD RS4000 TX/TX VPN
Affected: PHOENIX CONTACT FL MGUARD RS4004 TX/DTX
Affected: PHOENIX CONTACT FL MGUARD RS4004 TX/DTX VPN
Affected: PHOENIX CONTACT FL MGUARD SMART2
Affected: PHOENIX CONTACT FL MGUARD SMART2 VPN
Affected: PHOENIX CONTACT TC MGUARD RS2000 3G VPN
Affected: PHOENIX CONTACT TC MGUARD RS2000 4G ATT VPN
Affected: PHOENIX CONTACT TC MGUARD RS2000 4G VPN
Affected: PHOENIX CONTACT TC MGUARD RS2000 4G VZW VPN
Affected: PHOENIX CONTACT TC MGUARD RS4000 3G VPN
Affected: PHOENIX CONTACT TC MGUARD RS4000 4G ATT VPN
Affected: PHOENIX CONTACT TC MGUARD RS4000 4G VPN
Affected: PHOENIX CONTACT TC MGUARD RS4000 4G VZW VPN
Published at:
Updated at:

References

Link Tags
https://cert.vde.com/en/advisories/VDE-2022-051/ third party advisory mitigation

Frequently Asked Questions

What is the severity of CVE-2022-3480?
CVE-2022-3480 has been scored as a high severity vulnerability.
How to fix CVE-2022-3480?
To fix CVE-2022-3480: Upgrade to firmware version >= 8.9.0
Is CVE-2022-3480 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-3480 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-3480?
CVE-2022-3480 affects PHOENIX CONTACT FL MGUARD CENTERPORT, PHOENIX CONTACT FL MGUARD CENTERPORT VPN-1000, PHOENIX CONTACT FL MGUARD CORE TX, PHOENIX CONTACT FL MGUARD CORE TX VPN, PHOENIX CONTACT FL MGUARD DELTA TX/TX, PHOENIX CONTACT FL MGUARD DELTA TX/TX VPN, PHOENIX CONTACT FL MGUARD GT/GT, PHOENIX CONTACT FL MGUARD GT/GT VPN, PHOENIX CONTACT FL MGUARD PCI4000, PHOENIX CONTACT FL MGUARD PCI4000 VPN, PHOENIX CONTACT FL MGUARD PCIE4000, PHOENIX CONTACT FL MGUARD PCIE4000 VPN, PHOENIX CONTACT FL MGUARD RS2000 TX/TX-B, PHOENIX CONTACT FL MGUARD RS2000 TX/TX VPN, PHOENIX CONTACT FL MGUARD RS2005 TX VPN, PHOENIX CONTACT FL MGUARD RS4000 TX/TX, PHOENIX CONTACT FL MGUARD RS4000 TX/TX-M, PHOENIX CONTACT FL MGUARD RS4000 TX/TX-P, PHOENIX CONTACT FL MGUARD RS4000 TX/TX VPN, PHOENIX CONTACT FL MGUARD RS4004 TX/DTX, PHOENIX CONTACT FL MGUARD RS4004 TX/DTX VPN, PHOENIX CONTACT FL MGUARD SMART2, PHOENIX CONTACT FL MGUARD SMART2 VPN, PHOENIX CONTACT TC MGUARD RS2000 3G VPN, PHOENIX CONTACT TC MGUARD RS2000 4G ATT VPN, PHOENIX CONTACT TC MGUARD RS2000 4G VPN, PHOENIX CONTACT TC MGUARD RS2000 4G VZW VPN, PHOENIX CONTACT TC MGUARD RS4000 3G VPN, PHOENIX CONTACT TC MGUARD RS4000 4G ATT VPN, PHOENIX CONTACT TC MGUARD RS4000 4G VPN, PHOENIX CONTACT TC MGUARD RS4000 4G VZW VPN.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.