The Motorola MOSCAD and ACE line of RTUs through 2022-05-02 omit an authentication requirement. They feature IP Gateway modules which allow for interfacing between Motorola Data Link Communication (MDLC) networks (potentially over a variety of serial, RF and/or Ethernet links) and TCP/IP networks. Communication with RTUs behind the gateway is done by means of the proprietary IPGW protocol (5001/TCP). This protocol does not have any authentication features, allowing any attacker capable of communicating with the port in question to invoke (a subset of) desired functionality.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-04 | Mitigation Third Party Advisory US Government Resource |
https://www.forescout.com/blog/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-07-26 23:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-30276
Mitre link : CVE-2022-30276
CVE.ORG link : CVE-2022-30276
JSON object : View
Products Affected
motorola
- moscad_ip_gateway_firmware
- moscad_ip_gateway
- ace_ip_gateway_\(4600\)_firmware
- ace_ip_gateway_\(4600\)
CWE
CWE-306
Missing Authentication for Critical Function