
- Phoenix contact mguard update#
- Phoenix contact mguard upgrade#
- Phoenix contact mguard software#
- Phoenix contact mguard password#
- Phoenix contact mguard download#
Phoenix contact mguard download#
Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.Īdditional mitigation guidance and recommended practices are publicly available in the ICS‑CERT Technical Information Paper, ICS-TIP-12-146-01B-Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site. ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page. ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. Also recognize that VPN is only as secure as the connected devices.
Phoenix contact mguard upgrade#
PHOENIX CONTACT recommends that users upgrade to firmware Version 8.5.0, or higher, to mitigate the vulnerabilities. Successful exploitation of these vulnerabilities could allow an attacker to disrupt the availability of the device and gain unauthorized access to the device.
Phoenix contact mguard update#
If SSH or HTTPS access was possible from untrusted sources after an update to Version 8.4.0, please flash the device and exchange all private keys and passphrases in the configuration.
Phoenix contact mguard password#
If an update to Version 8.4.0 already has been performed, please change the “admin” password via WebUI or command line. PHOENIX CONTACT recommends users update to Version 8.4.1 (or higher, if applicable). This vulnerability could allow an attacker to log into the system with administrative privileges. Only devices that have been updated to Version 8.4.0 are affected.


PHOENIX CONTACT reports that the vulnerability affects the following mGuard products:

Phoenix contact mguard software#
Vulnerability: Software update changes password to default AFFECTED PRODUCTS

ATTENTION: Remotely exploitable/low skill level to exploit
