First published: Tue Jul 26 2022(Updated: )
The Motorola MDLC protocol through 2022-05-02 mishandles message integrity. It supports three security modes: Plain, Legacy Encryption, and New Encryption. In Legacy Encryption mode, traffic is encrypted via the Tiny Encryption Algorithm (TEA) block-cipher in ECB mode. This mode of operation does not offer message integrity and offers reduced confidentiality above the block level, as demonstrated by an ECB Penguin attack against any block ciphers.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Motorola Solutions MDLC | ||
Motorola Solutions MDLC | =4.80.0024 | |
Motorola Solutions MDLC | =4.82.004 | |
Motorola Solutions MDLC | =4.83.001 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30273 is considered a moderate severity vulnerability due to its impact on message integrity.
To fix CVE-2022-30273, update the Motorola MDLC software to versions beyond 4.83.001.
CVE-2022-30273 affects Motorola MDLC versions 4.80.0024, 4.82.004, and 4.83.001.
CVE-2022-30273 is a vulnerability related to improper handling of message integrity in the Motorola MDLC protocol.
Yes, CVE-2022-30273 primarily impacts the Legacy Encryption mode using the Tiny Encryption Algorithm in ECB mode.