First published: Tue Jul 26 2022(Updated: )
The Motorola MOSCAD and ACE line of RTUs through 2022-05-02 omit an authentication requirement. They feature IP Gateway modules which allow for interfacing between Motorola Data Link Communication (MDLC) networks (potentially over a variety of serial, RF and/or Ethernet links) and TCP/IP networks. Communication with RTUs behind the gateway is done by means of the proprietary IPGW protocol (5001/TCP). This protocol does not have any authentication features, allowing any attacker capable of communicating with the port in question to invoke (a subset of) desired functionality.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Motorola Moscad Ip Gateway Firmware | ||
Motorola Moscad Ip Gateway | ||
Motorola Ace Ip Gateway \(4600\) Firmware | ||
Motorola Ace Ip Gateway \(4600\) | ||
All of | ||
Motorola Moscad Ip Gateway Firmware | ||
Motorola Moscad Ip Gateway | ||
All of | ||
Motorola Ace Ip Gateway \(4600\) Firmware | ||
Motorola Ace Ip Gateway \(4600\) | ||
Motorola Solutions CRITICAL INFRASTRUCTURE SECTORS: Multiple | ||
Motorola Solutions COUNTRIES/AREAS DEPLOYED: Worldwide | ||
Motorola Solutions COMPANY HEADQUARTERS LOCATION: United States |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30276 is a vulnerability in the Motorola MOSCAD and ACE line of RTUs that allows unauthorized access due to the omission of an authentication requirement.
CVE-2022-30276 allows attackers to gain unauthorized access to the affected systems.
CVE-2022-30276 has a severity rating of 7.5 (high).
CVE-2022-30276 affects the Motorola MOSCAD and ACE line of RTUs with specific firmware versions.
To mitigate CVE-2022-30276, it is recommended to apply the necessary firmware updates provided by Motorola.