Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-34137 | Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allow UDP packets to bypass the filter rules and access the solely connected device behind the MGUARD which can be used for flooding attacks. |
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2023-010/ |
|
Fri, 03 Jan 2025 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 02 Oct 2024 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 |
Wed, 02 Oct 2024 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1287 |
Subscriptions
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-01-03T01:57:54.039Z
Reserved: 2023-05-12T06:13:26.259Z
Link: CVE-2023-2673
Updated: 2024-08-02T06:33:04.323Z
Status : Modified
Published: 2023-06-13T07:15:46.460
Modified: 2024-11-21T07:59:03.280
Link: CVE-2023-2673
No data.
OpenCVE Enrichment
No data.
EUVD