CVE-2024-43389
📋 TL;DR
A low-privileged remote attacker can modify OSPF service configuration through environment variables OSPF_INTERFACE.SIMPLE_KEY and OSPF_INTERFACE.DIGEST_KEY, potentially causing denial of service. This affects systems running vulnerable OSPF implementations where these variables are improperly secured.
💻 Affected Systems
- OSPF implementations using vulnerable environment variable handling
📦 What is this software?
Fl Mguard 2102 Firmware by Phoenixcontact
Fl Mguard 2105 Firmware by Phoenixcontact
Fl Mguard 4102 Pcie Firmware by Phoenixcontact
Fl Mguard 4302 Firmware by Phoenixcontact
Fl Mguard 4305 Firmware by Phoenixcontact
Fl Mguard Centerport Vpn 1000 Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Centerport Vpn 1000 Firmware →
Fl Mguard Core Tx Vpn Firmware by Phoenixcontact
Fl Mguard Delta Tx\/tx Firmware by Phoenixcontact
Fl Mguard Delta Tx\/tx Vpn Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Delta Tx\/tx Vpn Firmware →
Fl Mguard Gt\/gt Firmware by Phoenixcontact
Fl Mguard Gt\/gt Vpn Firmware by Phoenixcontact
Fl Mguard Pci4000 Vpn Firmware by Phoenixcontact
Fl Mguard Pcie4000 Vpn Firmware by Phoenixcontact
Fl Mguard Rs2000 Tx\/tx B Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Rs2000 Tx\/tx B Firmware →
Fl Mguard Rs2000 Tx\/tx Vpn Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Rs2000 Tx\/tx Vpn Firmware →
Fl Mguard Rs2005 Tx Vpn Firmware by Phoenixcontact
Fl Mguard Rs4000 Tx\/tx Firmware by Phoenixcontact
Fl Mguard Rs4000 Tx\/tx M Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Rs4000 Tx\/tx M Firmware →
Fl Mguard Rs4000 Tx\/tx P Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Rs4000 Tx\/tx P Firmware →
Fl Mguard Rs4000 Tx\/tx Vpn Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Rs4000 Tx\/tx Vpn Firmware →
Fl Mguard Rs4004 Tx\/dtx Firmware by Phoenixcontact
Fl Mguard Rs4004 Tx\/dtx Vpn Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Rs4004 Tx\/dtx Vpn Firmware →
Fl Mguard Smart2 Firmware by Phoenixcontact
Fl Mguard Smart2 Vpn Firmware by Phoenixcontact
Tc Mguard Rs2000 3g Vpn Firmware by Phoenixcontact
Tc Mguard Rs2000 4g Att Vpn Firmware by Phoenixcontact
View all CVEs affecting Tc Mguard Rs2000 4g Att Vpn Firmware →
Tc Mguard Rs2000 4g Vpn Firmware by Phoenixcontact
Tc Mguard Rs2000 4g Vzw Vpn Firmware by Phoenixcontact
View all CVEs affecting Tc Mguard Rs2000 4g Vzw Vpn Firmware →
Tc Mguard Rs4000 3g Vpn Firmware by Phoenixcontact
Tc Mguard Rs4000 4g Att Vpn Firmware by Phoenixcontact
View all CVEs affecting Tc Mguard Rs4000 4g Att Vpn Firmware →
Tc Mguard Rs4000 4g Vpn Firmware by Phoenixcontact
⚠️ Risk & Real-World Impact
Worst Case
Complete network disruption through OSPF route poisoning, causing widespread DoS across routing infrastructure.
Likely Case
Localized network instability or service disruption affecting OSPF routing tables.
If Mitigated
Minimal impact if proper access controls and environment variable restrictions are enforced.
🎯 Exploit Status
Exploitation requires low-privileged access to modify environment variables, making it straightforward for authenticated attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor-specific updates; reference VDE-2024-039 advisory for details.
Vendor Advisory: https://cert.vde.com/en/advisories/VDE-2024-039
Restart Required: Yes
Instructions:
1. Review VDE advisory for affected products. 2. Apply vendor-provided patches. 3. Restart OSPF services. 4. Verify environment variable restrictions are enforced.
🔧 Temporary Workarounds
Restrict Environment Variable Access
linuxLimit ability to set OSPF_INTERFACE.SIMPLE_KEY and OSPF_INTERFACE.DIGEST_KEY environment variables to privileged users only.
export OSPF_INTERFACE_SIMPLE_KEY=""
export OSPF_INTERFACE_DIGEST_KEY=""
chmod 600 /etc/environment
Network Segmentation
allIsolate OSPF services from untrusted networks and low-privileged user access.
🧯 If You Can't Patch
- Implement strict access controls to prevent low-privileged users from modifying OSPF configuration or environment variables.
- Monitor and alert on unauthorized changes to OSPF configuration files or environment variables.
🔍 How to Verify
Check if Vulnerable:
Check if OSPF_INTERFACE.SIMPLE_KEY or OSPF_INTERFACE.DIGEST_KEY environment variables are writable by low-privileged users: `env | grep OSPF_INTERFACE` and review permissions.
Check Version:
Check OSPF implementation version via vendor-specific commands; e.g., `ospfd -v` or consult vendor documentation.
Verify Fix Applied:
Verify environment variables cannot be modified by non-privileged users and OSPF service runs with restricted privileges.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized OSPF configuration changes
- Failed authentication attempts to modify OSPF settings
- Unexpected OSPF route advertisements
Network Indicators:
- Abnormal OSPF packet floods
- Unexpected routing table changes
- OSPF neighbor state fluctuations
SIEM Query:
source="ospf.log" AND (event="config_change" OR event="auth_failure")