CVE-2024-43387
📋 TL;DR
A low-privileged remote attacker can read and write files as root on mGuard devices due to improper input sanitization of the EMAIL_RELAY_PASSWORD variable. This allows privilege escalation to root access. Organizations using affected mGuard devices are vulnerable.
💻 Affected Systems
- Phoenix Contact mGuard devices
📦 What is this software?
Fl Mguard 2102 Firmware by Phoenixcontact
Fl Mguard 2105 Firmware by Phoenixcontact
Fl Mguard 4102 Pcie Firmware by Phoenixcontact
Fl Mguard 4302 Firmware by Phoenixcontact
Fl Mguard 4305 Firmware by Phoenixcontact
Fl Mguard Centerport Vpn 1000 Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Centerport Vpn 1000 Firmware →
Fl Mguard Core Tx Vpn Firmware by Phoenixcontact
Fl Mguard Delta Tx\/tx Firmware by Phoenixcontact
Fl Mguard Delta Tx\/tx Vpn Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Delta Tx\/tx Vpn Firmware →
Fl Mguard Gt\/gt Firmware by Phoenixcontact
Fl Mguard Gt\/gt Vpn Firmware by Phoenixcontact
Fl Mguard Pci4000 Vpn Firmware by Phoenixcontact
Fl Mguard Pcie4000 Vpn Firmware by Phoenixcontact
Fl Mguard Rs2000 Tx\/tx B Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Rs2000 Tx\/tx B Firmware →
Fl Mguard Rs2000 Tx\/tx Vpn Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Rs2000 Tx\/tx Vpn Firmware →
Fl Mguard Rs2005 Tx Vpn Firmware by Phoenixcontact
Fl Mguard Rs4000 Tx\/tx Firmware by Phoenixcontact
Fl Mguard Rs4000 Tx\/tx M Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Rs4000 Tx\/tx M Firmware →
Fl Mguard Rs4000 Tx\/tx P Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Rs4000 Tx\/tx P Firmware →
Fl Mguard Rs4000 Tx\/tx Vpn Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Rs4000 Tx\/tx Vpn Firmware →
Fl Mguard Rs4004 Tx\/dtx Firmware by Phoenixcontact
Fl Mguard Rs4004 Tx\/dtx Vpn Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Rs4004 Tx\/dtx Vpn Firmware →
Fl Mguard Smart2 Firmware by Phoenixcontact
Fl Mguard Smart2 Vpn Firmware by Phoenixcontact
Tc Mguard Rs2000 3g Vpn Firmware by Phoenixcontact
Tc Mguard Rs2000 4g Att Vpn Firmware by Phoenixcontact
View all CVEs affecting Tc Mguard Rs2000 4g Att Vpn Firmware →
Tc Mguard Rs2000 4g Vpn Firmware by Phoenixcontact
Tc Mguard Rs2000 4g Vzw Vpn Firmware by Phoenixcontact
View all CVEs affecting Tc Mguard Rs2000 4g Vzw Vpn Firmware →
Tc Mguard Rs4000 3g Vpn Firmware by Phoenixcontact
Tc Mguard Rs4000 4g Att Vpn Firmware by Phoenixcontact
View all CVEs affecting Tc Mguard Rs4000 4g Att Vpn Firmware →
Tc Mguard Rs4000 4g Vpn Firmware by Phoenixcontact
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with root access, allowing installation of persistent backdoors, data exfiltration, and use as pivot point into internal networks.
Likely Case
Attackers gain root privileges to steal credentials, modify configurations, or disrupt network security functions.
If Mitigated
Limited to isolated network segments with strict access controls preventing external exploitation.
🎯 Exploit Status
Requires low-privileged access first. The CWE-78 (OS Command Injection) nature suggests straightforward exploitation once initial access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firmware version 8.10.0
Vendor Advisory: https://cert.vde.com/en/advisories/VDE-2024-039
Restart Required: Yes
Instructions:
1. Download firmware 8.10.0 from Phoenix Contact support portal. 2. Backup current configuration. 3. Upload firmware via web interface. 4. Apply firmware update. 5. Reboot device. 6. Restore configuration if needed.
🔧 Temporary Workarounds
Disable email relay functionality
allRemove or disable email relay configuration to eliminate the vulnerable code path
Login to mGuard web interface
Navigate to System > Email
Remove email relay server configuration
Save changes
Restrict network access
allLimit access to mGuard management interfaces to trusted IP addresses only
Configure firewall rules to restrict access to mGuard management IP/ports
Allow only from specific management networks
🧯 If You Can't Patch
- Isolate mGuard devices in separate VLAN with strict network segmentation
- Implement multi-factor authentication and strong credential policies for all user accounts
🔍 How to Verify
Check if Vulnerable:
Check firmware version via web interface: System > Information. Versions below 8.10.0 are vulnerable.
Check Version:
ssh admin@mgurard-ip 'cat /etc/version' or check web interface System > Information
Verify Fix Applied:
Confirm firmware version is 8.10.0 or higher in System > Information page.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns in system logs
- Unexpected privilege escalation events
- Suspicious commands executed with root privileges
Network Indicators:
- Unusual outbound connections from mGuard devices
- Unexpected SSH or management traffic patterns
SIEM Query:
source="mgurard-logs" AND (event="privilege_escalation" OR event="file_access" AND user="root")