CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
EPSS
Percentile
17.7%
An unauthenticated remote attacker can exploit the behavior of the pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to blocking of valid IPsec VPN peers.
Vendor | Product | Version | CPE |
---|---|---|---|
phoenixcontact | tc_mguard_rs4000_4g_vzw_vpn_firmware | * | cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:* |
phoenixcontact | tc_mguard_rs4000_4g_vzw_vpn | - | cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vzw_vpn:-:*:*:*:*:*:*:* |
phoenixcontact | tc_mguard_rs4000_4g_vpn_firmware | * | cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_vpn_firmware:*:*:*:*:*:*:*:* |
phoenixcontact | tc_mguard_rs4000_4g_vpn | - | cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_vpn:-:*:*:*:*:*:*:* |
phoenixcontact | tc_mguard_rs4000_4g_att_vpn_firmware | * | cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_4g_att_vpn_firmware:*:*:*:*:*:*:*:* |
phoenixcontact | tc_mguard_rs4000_4g_att_vpn | - | cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_4g_att_vpn:-:*:*:*:*:*:*:* |
phoenixcontact | tc_mguard_rs4000_3g_vpn_firmware | * | cpe:2.3:o:phoenixcontact:tc_mguard_rs4000_3g_vpn_firmware:*:*:*:*:*:*:*:* |
phoenixcontact | tc_mguard_rs4000_3g_vpn | - | cpe:2.3:h:phoenixcontact:tc_mguard_rs4000_3g_vpn:-:*:*:*:*:*:*:* |
phoenixcontact | tc_mguard_rs2000_4g_vzw_vpn_firmware | * | cpe:2.3:o:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn_firmware:*:*:*:*:*:*:*:* |
phoenixcontact | tc_mguard_rs2000_4g_vzw_vpn | - | cpe:2.3:h:phoenixcontact:tc_mguard_rs2000_4g_vzw_vpn:-:*:*:*:*:*:*:* |