First published: Tue Jul 26 2022(Updated: )
The Motorola ACE1000 RTU through 2022-05-02 has default credentials. It exposes an SSH interface on port 22/TCP. This interface is used for remote maintenance and for SFTP file-transfer operations that are part of engineering software functionality. Access to this interface is controlled by 5 preconfigured accounts (root, abuilder, acelogin, cappl, ace), all of which come with default credentials. Although the ACE1000 documentation mentions the root, abuilder and acelogin accounts and instructs users to change the default credentials, the cappl and ace accounts remain undocumented and thus are unlikely to have their credentials changed.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Motorola Ace1000 Firmware | ||
Motorola ACE1000 | ||
Motorola Solutions ACE1000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30270 is a vulnerability in the Motorola ACE1000 RTU, which has default credentials allowing unauthorized access to the SSH interface.
CVE-2022-30270 has a severity rating of 9.8, which is considered critical.
CVE-2022-30270 affects the Motorola ACE1000 RTU by providing unauthorized access to the SSH interface due to default credentials.
To fix CVE-2022-30270, it is recommended to update the firmware of the Motorola ACE1000 RTU and change the default credentials to secure the SSH interface.
Yes, you can find more information about CVE-2022-30270 at the following references: [https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-06](https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-06) and [https://www.forescout.com/blog/](https://www.forescout.com/blog/).