![]() ![]() NCCIC/ICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of this vulnerability. Links to updates and additional information can be found in the advisory at the following location: PHOENIX CONTACT and Innominate Security Technologies recommend all users running mGuard devices with affected firmware versions to update to firmware Version 8.5.2 or higher, which fixes this vulnerability. Successful exploitation of this vulnerability could allow attackers to cause a remote denial of service and force a restart of all IPSec connections. The following versions of mGuard firmware versions 8.0.0 to 8.5.1, running on these mGuard Network Security Appliances, are affected: Vulnerability: Null Pointer Dereference AFFECTED PRODUCTS Vendor: PHOENIX CONTACT, Innominate Security Technologies ![]() Due to its front-side configuration memory in the s ecurely tunneled connection to your machines and con- form of an exchangeable SD card, the new mGuard trol units via the Internet, facilitating their monitoring, rs2000 3G can be quickly and easily put into operation, remote operation and remote maintenance.ATTENTION: Remotely exploitable/low skill level to exploit. Based on a hardened embedded Linux from Whether in pumping stations for oil, gas or water, in wind Innominate, the mGuard firmware integrates three com- parks for energy production, in building services systems plementary security components: a bidirectional stateful or in production plants with a limited local network: firewall, a flexible NAT router and a highly secure VPN mGuard rs2000 3G devices allow you to generate a router. power ul mGuard hardware platform with proven mGuard f firmware. Simple and self-sufficient A reduced yet compatible firmware functionality and a simple “2-click” firewall enable quick start-up of mGuard Reliability redefined rs2000 3G devices in the field, underlining their “ease of The security appliances of the mGuard Field Line, deve- use” approach as robust, industry-standard field devices loped and manufactured in Germany, combine the for trouble-free, self-sufficient operation. As a security add-on, the connections can be switched on and off by switch contact, SMS text message or software interface. It functions as a robust remote access infrastructure for the secure connection of globally distributed machines and control units. For location-independent remote maintenance scenarios, the mGuard rs2000 3G can be used as a VPN client for up to two parallel, IPsec-encrypted VPN tunnels. The GPS / GLONASS receiver allows precise time synchronization and innovative positioning services. The COM server function enables you to integrate automation devices ith w purely serial interfaces in networks. As a standard feature, the appliance supports virtual private networks (VPNs) based on the open Internet standard IPsec. The mGuard rs2000 3G is compact, stainless steel casing for industrial DIN rail ideal for secure remote maintenance scenarios in loca- tions without a wired network. ![]() The aged LAN switch and an industrial 3G cellular modem mGuard rs2000 3G from the Field Line convinces with its for GPRS, UMTS and CDMA networks with download secure transmission paths and ease of operation in a speeds of up to 14.4 Mbit / s. Industrial VPN router for field installations Hard shell, robust core Industry-standard remote maintenance The latest generation of inexpensive industrial remote As an extension to the tried and tested mGuard rs2000, services routers from Innominate comes as a cellular the new mGuard rs2000 3G integrates a 4-port unman router for GPRS, UMTS and CDMA networks. Protecting industrial networks Efficient. ![]()
0 Comments
Leave a Reply. |