First published: Tue Jul 26 2022(Updated: )
The Motorola MOSCAD and ACE line of RTUs through 2022-05-02 omit an authentication requirement. They feature IP Gateway modules which allow for interfacing between Motorola Data Link Communication (MDLC) networks (potentially over a variety of serial, RF and/or Ethernet links) and TCP/IP networks. Communication with RTUs behind the gateway is done by means of the proprietary IPGW protocol (5001/TCP). This protocol does not have any authentication features, allowing any attacker capable of communicating with the port in question to invoke (a subset of) desired functionality.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Motorola Moscad IP Gateway Firmware | ||
Motorola Moscad IP Gateway Firmware | ||
All of | ||
Motorola Ace Ip Gateway (4600) Firmware | ||
Motorola Ace IP Gateway (4600) | ||
Motorola Moscad IP Gateway Firmware | ||
Motorola Moscad IP Gateway Firmware | ||
Motorola Ace Ip Gateway (4600) Firmware | ||
Motorola Ace IP Gateway (4600) | ||
Motorola Solutions CRITICAL INFRASTRUCTURE SECTORS | ||
Motorola Solutions | ||
Motorola Solutions |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30276 is a vulnerability in the Motorola MOSCAD and ACE line of RTUs that allows unauthorized access due to the omission of an authentication requirement.
CVE-2022-30276 allows attackers to gain unauthorized access to the affected systems.
CVE-2022-30276 has a severity rating of 7.5 (high).
CVE-2022-30276 affects the Motorola MOSCAD and ACE line of RTUs with specific firmware versions.
To mitigate CVE-2022-30276, it is recommended to apply the necessary firmware updates provided by Motorola.