← Back to CVEs
CVE-2022-30274
CRITICAL9.8
Description
The Motorola ACE1000 RTU through 2022-05-02 uses ECB encryption unsafely. It can communicate with an XRT LAN-to-radio gateway by means of an embedded client. Credentials for accessing this gateway are stored after being encrypted with the Tiny Encryption Algorithm (TEA) in ECB mode using a hardcoded key. Similarly, the ACE1000 RTU can route MDLC traffic over Extended Command and Management Protocol (XCMP) and Network Layer (XNL) networks via the MDLC driver. Authentication to the XNL port is protected by TEA in ECB mode using a hardcoded key.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published7/26/2022
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
motorola:ace1000motorola:ace1000_firmware
Weaknesses (CWE)
CWE-798
References
https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-06(cve@mitre.org)
https://www.forescout.com/blog/(cve@mitre.org)
https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-06(af854a3a-2127-422b-91ae-364da2661108)
https://www.forescout.com/blog/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.