CVE-2021-34598

7.5 HIGH

📋 TL;DR

This vulnerability affects Phoenix Contact FL MGUARD 1102 and 1105 devices when remote logging is enabled. It causes memory exhaustion due to improper memory release in syslog-ng, potentially leading to denial of service. Organizations using these industrial security devices with remote logging active are affected.

💻 Affected Systems

Products:
  • Phoenix Contact FL MGUARD 1102
  • Phoenix Contact FL MGUARD 1105
Versions: Versions 1.4.0, 1.4.1, and 1.5.0
Operating Systems: Embedded Linux (device-specific)
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when remote logging functionality is active. Local logging is not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device crash and denial of service, disrupting industrial network security functions and potentially causing operational downtime in critical infrastructure.

🟠

Likely Case

Gradual performance degradation leading to eventual device instability or reboot, interrupting network security monitoring and logging capabilities.

🟢

If Mitigated

Minimal impact if remote logging is disabled or devices are patched, maintaining normal device functionality.

🌐 Internet-Facing: MEDIUM - Devices exposed to internet could be targeted for DoS attacks, but exploitation requires specific conditions (remote logging enabled).
🏢 Internal Only: MEDIUM - Internal attackers with network access could trigger the memory exhaustion, but requires remote logging to be active.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires remote logging to be enabled and would involve sending syslog traffic to trigger the memory leak. No authentication bypass is needed if network access to logging port is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.5.1 or later

Vendor Advisory: https://cert.vde.com/en/advisories/VDE-2021-046/

Restart Required: Yes

Instructions:

1. Download firmware update from Phoenix Contact support portal. 2. Backup device configuration. 3. Upload and apply firmware update via web interface or CLI. 4. Reboot device. 5. Verify version is 1.5.1 or later.

🔧 Temporary Workarounds

Disable Remote Logging

all

Temporarily disable remote syslog functionality to prevent memory exhaustion

# Via web interface: Navigate to System > Logging > Remote Logging and disable
# Via CLI: configure system logging remote disable

Restrict Syslog Network Access

linux

Limit network access to syslog port (typically UDP 514) to trusted sources only

# Configure firewall rules to restrict access to syslog port
iptables -A INPUT -p udp --dport 514 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p udp --dport 514 -j DROP

🧯 If You Can't Patch

  • Disable remote logging functionality immediately
  • Implement network segmentation to isolate affected devices from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check device version via web interface (System > Information) or CLI command 'show version'. If version is 1.4.0, 1.4.1, or 1.5.0 AND remote logging is enabled, device is vulnerable.

Check Version:

show version

Verify Fix Applied:

Verify device version is 1.5.1 or later and monitor system memory usage during remote logging operations for stability.

📡 Detection & Monitoring

Log Indicators:

  • Repeated device reboots
  • High memory usage warnings in system logs
  • Syslog-ng process crashes or restarts

Network Indicators:

  • Unusual volume of syslog traffic to affected devices
  • Device becoming unresponsive to network requests

SIEM Query:

source="mgard*" AND (event_type="system_reboot" OR memory_usage>90) OR (process="syslog-ng" AND status="crashed")

🔗 References

📤 Share & Export