First published: Thu Jun 13 2024(Updated: )
An unauthorized user is able to gain access to sensitive data, including credentials, by physically retrieving the hard disk of the product as the data is stored in clear text.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Motorola Solutions Vigilant Fixed LPR Coms Box | <=3.1.171.9 | |
Motorola Solutions Vigilant Fixed LPR Coms Box |
Motorola Solutions recommends the following for each identified vulnerability: CVE-2024-38280: * Apply encryption to all Criminal Justice Information (CJI) data. * Apply full disk encryption with LUKS encryption standards and add password protection to the GRUB Bootloader. * Perform column-level encryption for sensitive data in the database. All devices shipped after May 10, 2024 are already using full disk encryption. All devices that are not able to have full disk encryption applied have had all CJI data encrypted. No further actions are required by customers.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38280 has a high severity rating due to the exposure of sensitive data.
To mitigate CVE-2024-38280, ensure that sensitive data is encrypted before storage on thehard disk.
CVE-2024-38280 affects the Motorola Vigilant Fixed LPR Coms Box Firmware versions up to and including 3.1.171.9.
CVE-2024-38280 requires physical access to the device, so it cannot be exploited remotely.
There is currently no official patch for CVE-2024-38280, but users should implement data protection measures.