

No known public exploits specifically target this vulnerability.

Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.


Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.Īdditional mitigation guidance and recommended practices are publicly available in the NCCIC Technical Information Paper, ICS-TIP-12-146-01B-Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site. NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures. Also recognize that VPN is only as secure as the connected devices. When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available.Locate control system networks and remote devices behind firewalls, and isolate them from the business network.Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet.NCCIC recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities.
#MGUARD VPN UPGRADE#
PHOENIX CONTACT recommends that affected users upgrade to firmware version 8.6.1
#MGUARD VPN UPDATE#
Successful exploitation of this vulnerability could allow for an attacker to modify firmware update packages. The following versions of mGuard, a network device, are affected: Features include: A high capacity anti-virus ClamAV engine, Fiber and/or RJ45 connection options, maximum data throughput via encrypted high speed VPN (250 tunnels), 1:1 NAT/Firewall, DIN rail mount with 9.6V to 60VDC (redundant) inputs, a USB port that supports a configuration flash adapter and remote administration via the Internet.Hirschmann Automation and Control is a global company that specializes in automation and networking systems and offers a broad range of industrial Ethernet products.Vulnerability: Improper Validation of Integrity Check Value AFFECTED PRODUCTS Integration, regardless of the application or operating system, is easily done with the learning mode and default one-way communication.
#MGUARD VPN INSTALL#
In addition EAGLE mGuard provides anti-virus protection with automated virus definition updates.All security functions are integrated into the self-contained independent EAGLE mGuard platform, eliminating the need to reconfigure the system being protected or install additional drivers or software. It offers users advanced authentication, access control, firewall, VPN tunneling, and encryption to achieve the highest level of security for industrial Ethernet networks. To meet the growing need for increased protection and security in Industrial Ethernet networks Hirschmann has introduced Eagle mGuard - High Speed VPN, Firewall, Routing and Anti-virus protection.The EAGLE mGuard is the first industrial, high performance firewall (99% wire-speed throughput) built for harsh and demanding environments. Hirschmann introduces EAGLE mGuard Firewall
