Your one-stop web resource providing safety and security information to manufacturers

Innominate created a patch to mitigate a denial-of-service (DoS) vulnerability in its mGuard device, according to a report on ICS-CERT.

Inominate self identified the remotely exploitable vulnerability. Innominate mGuard firmware, Version 8.0.0 to Version 8.1.6.

Siemens Fixes SIMATIC S7-1200 Hole
Moxa Fixes Buffer Overflows
E+H HART Device DTM Hole Fixed
OSIsoft Fixes PI Data Archive Holes

Successful exploitation of this vulnerability could result in a DoS condition.

Innominate is a German-based company that sells products worldwide through its international partners.

Schneider Bold

The affected products, the mGuard family of products, are industrial security routers. They are in critical infrastructure sectors, including communications, critical manufacturing, and healthcare and public health.

It is possible to cause a temporary DoS condition on the VPN daemon on the VPN waiting side if the VPN initiating peer has the option “IPsec compression” enabled.

CVE-2015-3966 is the case number assigned to this vulnerability, which has a CVSS v2 base score of 7.8.

No known public exploits specifically target this vulnerability. An attacker with a low skill would be able to exploit this vulnerability.

Innominate released firmware patches for the affected versions, Versions 8.0.0 through 8.1.6 that mitigate the vulnerability in the mGuard firmware. Innominate recommended those using firmware versions older than Version 7, which are no longer being maintained, should upgrade to mGuard firmware Version 8.1.7. Innominate also said users should limit access to the administrative interfaces to a minimum via firewall rules.

For additional information on the vulnerability, click here for Innominate’s security advisory.

Click here for Innominate’s firmware updates.

Pin It on Pinterest

Share This