CWE
287 798
Advisory Published
Updated

CVE-2022-30270

First published: Tue Jul 26 2022(Updated: )

The Motorola ACE1000 RTU through 2022-05-02 has default credentials. It exposes an SSH interface on port 22/TCP. This interface is used for remote maintenance and for SFTP file-transfer operations that are part of engineering software functionality. Access to this interface is controlled by 5 preconfigured accounts (root, abuilder, acelogin, cappl, ace), all of which come with default credentials. Although the ACE1000 documentation mentions the root, abuilder and acelogin accounts and instructs users to change the default credentials, the cappl and ace accounts remain undocumented and thus are unlikely to have their credentials changed.

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Motorola Ace1000 Firmware
Motorola ACE1000
Motorola Solutions ACE1000

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2022-30270?

    CVE-2022-30270 is a vulnerability in the Motorola ACE1000 RTU, which has default credentials allowing unauthorized access to the SSH interface.

  • What is the severity of CVE-2022-30270?

    CVE-2022-30270 has a severity rating of 9.8, which is considered critical.

  • How does CVE-2022-30270 affect the Motorola ACE1000 RTU?

    CVE-2022-30270 affects the Motorola ACE1000 RTU by providing unauthorized access to the SSH interface due to default credentials.

  • How can I fix CVE-2022-30270?

    To fix CVE-2022-30270, it is recommended to update the firmware of the Motorola ACE1000 RTU and change the default credentials to secure the SSH interface.

  • Are there any references for CVE-2022-30270?

    Yes, you can find more information about CVE-2022-30270 at the following references: [https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-06](https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-06) and [https://www.forescout.com/blog/](https://www.forescout.com/blog/).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203