First published: Tue Jul 26 2022(Updated: )
The Motorola ACE1000 RTU through 2022-05-02 uses ECB encryption unsafely. It can communicate with an XRT LAN-to-radio gateway by means of an embedded client. Credentials for accessing this gateway are stored after being encrypted with the Tiny Encryption Algorithm (TEA) in ECB mode using a hardcoded key. Similarly, the ACE1000 RTU can route MDLC traffic over Extended Command and Management Protocol (XCMP) and Network Layer (XNL) networks via the MDLC driver. Authentication to the XNL port is protected by TEA in ECB mode using a hardcoded key.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Motorola Ace1000 Firmware | ||
Motorola ACE1000 | ||
Motorola Solutions ACE1000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Motorola ACE1000 RTU vulnerability is CVE-2022-30274.
The severity rating of CVE-2022-30274 is critical.
The Motorola ACE1000 RTU uses ECB encryption unsafely by storing credentials in ECB mode using a hardcoded encryption algorithm.
The affected software for CVE-2022-30274 is the Motorola Ace1000 Firmware.
To fix the CVE-2022-30274 vulnerability, users should apply the latest firmware update provided by Motorola.