CVE-2024-43393
📋 TL;DR
This vulnerability allows low-privileged remote attackers to modify firewall configuration through environment variables, potentially causing denial of service. Systems running affected versions of the firewall software with default configurations are vulnerable.
💻 Affected Systems
- Firewall software with vulnerable environment variable handling
📦 What is this software?
Fl Mguard 2102 Firmware by Phoenixcontact
Fl Mguard 2105 Firmware by Phoenixcontact
Fl Mguard 4102 Pcie Firmware by Phoenixcontact
Fl Mguard 4302 Firmware by Phoenixcontact
Fl Mguard 4305 Firmware by Phoenixcontact
Fl Mguard Centerport Vpn 1000 Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Centerport Vpn 1000 Firmware →
Fl Mguard Core Tx Vpn Firmware by Phoenixcontact
Fl Mguard Delta Tx\/tx Firmware by Phoenixcontact
Fl Mguard Delta Tx\/tx Vpn Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Delta Tx\/tx Vpn Firmware →
Fl Mguard Gt\/gt Firmware by Phoenixcontact
Fl Mguard Gt\/gt Vpn Firmware by Phoenixcontact
Fl Mguard Pci4000 Vpn Firmware by Phoenixcontact
Fl Mguard Pcie4000 Vpn Firmware by Phoenixcontact
Fl Mguard Rs2000 Tx\/tx B Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Rs2000 Tx\/tx B Firmware →
Fl Mguard Rs2000 Tx\/tx Vpn Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Rs2000 Tx\/tx Vpn Firmware →
Fl Mguard Rs2005 Tx Vpn Firmware by Phoenixcontact
Fl Mguard Rs4000 Tx\/tx Firmware by Phoenixcontact
Fl Mguard Rs4000 Tx\/tx M Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Rs4000 Tx\/tx M Firmware →
Fl Mguard Rs4000 Tx\/tx P Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Rs4000 Tx\/tx P Firmware →
Fl Mguard Rs4000 Tx\/tx Vpn Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Rs4000 Tx\/tx Vpn Firmware →
Fl Mguard Rs4004 Tx\/dtx Firmware by Phoenixcontact
Fl Mguard Rs4004 Tx\/dtx Vpn Firmware by Phoenixcontact
View all CVEs affecting Fl Mguard Rs4004 Tx\/dtx Vpn Firmware →
Fl Mguard Smart2 Firmware by Phoenixcontact
Fl Mguard Smart2 Vpn Firmware by Phoenixcontact
Tc Mguard Rs2000 3g Vpn Firmware by Phoenixcontact
Tc Mguard Rs2000 4g Att Vpn Firmware by Phoenixcontact
View all CVEs affecting Tc Mguard Rs2000 4g Att Vpn Firmware →
Tc Mguard Rs2000 4g Vpn Firmware by Phoenixcontact
Tc Mguard Rs2000 4g Vzw Vpn Firmware by Phoenixcontact
View all CVEs affecting Tc Mguard Rs2000 4g Vzw Vpn Firmware →
Tc Mguard Rs4000 3g Vpn Firmware by Phoenixcontact
Tc Mguard Rs4000 4g Att Vpn Firmware by Phoenixcontact
View all CVEs affecting Tc Mguard Rs4000 4g Att Vpn Firmware →
Tc Mguard Rs4000 4g Vpn Firmware by Phoenixcontact
⚠️ Risk & Real-World Impact
Worst Case
Complete firewall bypass, network compromise, and persistent DoS affecting all network services
Likely Case
Firewall rule manipulation leading to service disruption and potential unauthorized network access
If Mitigated
Limited impact with proper access controls and monitoring in place
🎯 Exploit Status
Exploitation requires low-privileged access but is straightforward once access is obtained
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific patched versions
Vendor Advisory: https://cert.vde.com/en/advisories/VDE-2024-039
Restart Required: Yes
Instructions:
1. Review vendor advisory 2. Apply recommended patches 3. Restart firewall services 4. Verify configuration integrity
🔧 Temporary Workarounds
Restrict environment variable access
linuxLimit which users can set firewall-related environment variables
chmod 600 /etc/environment
setfacl -m u:firewalluser:rw /etc/environment
Disable vulnerable features
linuxTemporarily disable affected firewall modules if not critical
systemctl stop fw-module
iptables -F
🧯 If You Can't Patch
- Implement strict access controls to prevent low-privileged users from accessing firewall configuration
- Deploy network segmentation to limit potential impact of firewall rule changes
🔍 How to Verify
Check if Vulnerable:
Check if low-privileged users can modify FW_* environment variables and if firewall accepts these variables
Check Version:
firewall --version
Verify Fix Applied:
Test if environment variable manipulation no longer affects firewall configuration
📡 Detection & Monitoring
Log Indicators:
- Unauthorized modifications to firewall rules
- Unexpected environment variable changes
- Firewall service restarts by non-admin users
Network Indicators:
- Sudden changes in firewall behavior
- Unexpected port openings
- Traffic pattern anomalies
SIEM Query:
source="firewall.log" AND (event="rule_change" OR event="config_modify") AND user!="admin"