The Motorola MOSCAD and ACE line of RTUs through 2022-05-02 omit an authentication requirement. They feature IP Gateway modules which allow for interfacing between Motorola Data Link Communication (MDLC) networks (potentially over a variety of serial, RF and/or Ethernet links) and TCP/IP networks. Communication with RTUs behind the gateway is done by means of the proprietary IPGW protocol (5001/TCP). This protocol does not have any authentication features, allowing any attacker capable of communicating with the port in question to invoke (a subset of) desired functionality.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-04 | Mitigation Third Party Advisory US Government Resource |
https://www.forescout.com/blog/ | Third Party Advisory |
https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-04 | Mitigation Third Party Advisory US Government Resource |
https://www.forescout.com/blog/ | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-04 - Mitigation, Third Party Advisory, US Government Resource | |
References | () https://www.forescout.com/blog/ - Third Party Advisory |
Information
Published : 2022-07-26 23:15
Updated : 2024-11-21 07:02
NVD link : CVE-2022-30276
Mitre link : CVE-2022-30276
CVE.ORG link : CVE-2022-30276
JSON object : View
Products Affected
motorola
- ace_ip_gateway_\(4600\)
- ace_ip_gateway_\(4600\)_firmware
- moscad_ip_gateway
- moscad_ip_gateway_firmware
CWE
CWE-306
Missing Authentication for Critical Function