First published: Thu Jun 13 2024(Updated: )
An attacker can access the maintenance console using hard coded credentials for a hidden wireless network on the device.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Motorola Vigilant Fixed Lpr Coms Box Firmware | <=3.1.171.9 | |
Motorola Vigilant Fixed Lpr Coms Box |
Motorola Solutions recommends the following for each identified vulnerability: CVE-2024-38281: * Remove the hard-coded credential to access the wireless access point and disable the access point if not needed. * Set a unique SSID and password if the access point is needed. Motorola Solutions has already remediated this vulnerability for all vulnerable systems. No further actions are required by customers.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38281 has a critical severity rating due to the potential unauthorized access it allows to the maintenance console.
To mitigate CVE-2024-38281, you should update the Motorola Vigilant Fixed LPR Coms Box firmware to a version beyond 3.1.171.9.
CVE-2024-38281 specifically affects the Motorola Vigilant Fixed LPR Coms Box firmware versions up to 3.1.171.9.
An attacker can exploit CVE-2024-38281 by using hardcoded credentials to gain access to the hidden wireless network's maintenance console.
If your device is vulnerable to CVE-2024-38281, immediately update the firmware and review security settings to prevent unauthorized access.