CVE-2022-30276

The Motorola MOSCAD and ACE line of RTUs through 2022-05-02 omit an authentication requirement. They feature IP Gateway modules which allow for interfacing between Motorola Data Link Communication (MDLC) networks (potentially over a variety of serial, RF and/or Ethernet links) and TCP/IP networks. Communication with RTUs behind the gateway is done by means of the proprietary IPGW protocol (5001/TCP). This protocol does not have any authentication features, allowing any attacker capable of communicating with the port in question to invoke (a subset of) desired functionality.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-04 Mitigation Third Party Advisory US Government Resource
https://www.forescout.com/blog/ Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:motorola:moscad_ip_gateway_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:motorola:moscad_ip_gateway:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:motorola:ace_ip_gateway_\(4600\)_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:motorola:ace_ip_gateway_\(4600\):-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-07-26 23:15

Updated : 2024-02-28 19:29


NVD link : CVE-2022-30276

Mitre link : CVE-2022-30276

CVE.ORG link : CVE-2022-30276


JSON object : View

Products Affected

motorola

  • moscad_ip_gateway_firmware
  • moscad_ip_gateway
  • ace_ip_gateway_\(4600\)_firmware
  • ace_ip_gateway_\(4600\)
CWE
CWE-306

Missing Authentication for Critical Function