Lucene search

K
cve[email protected]CVE-2022-30276
HistoryJul 26, 2022 - 11:15 p.m.

CVE-2022-30276

2022-07-2623:15:08
CWE-306
web.nvd.nist.gov
38
3
cve-2022-30276
motorola
moscad
ace
rtus
authentication
ip gateway
mdlc
tcp/ip
ipgw protocol
nvd

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.7%

The Motorola MOSCAD and ACE line of RTUs through 2022-05-02 omit an authentication requirement. They feature IP Gateway modules which allow for interfacing between Motorola Data Link Communication (MDLC) networks (potentially over a variety of serial, RF and/or Ethernet links) and TCP/IP networks. Communication with RTUs behind the gateway is done by means of the proprietary IPGW protocol (5001/TCP). This protocol does not have any authentication features, allowing any attacker capable of communicating with the port in question to invoke (a subset of) desired functionality.

Affected configurations

NVD
Node
motorolamoscad_ip_gateway_firmware
AND
motorolamoscad_ip_gatewayMatch-
Node
motorolaace_ip_gateway_\(4600\)_firmware
AND
motorolaace_ip_gateway_\(4600\)Match-

Social References

More

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.5 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

23.7%

Related for CVE-2022-30276