Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-30276

Опубликовано: 26 июл. 2022
Источник: nvd
CVSS3: 7.5
EPSS Низкий

Описание

The Motorola MOSCAD and ACE line of RTUs through 2022-05-02 omit an authentication requirement. They feature IP Gateway modules which allow for interfacing between Motorola Data Link Communication (MDLC) networks (potentially over a variety of serial, RF and/or Ethernet links) and TCP/IP networks. Communication with RTUs behind the gateway is done by means of the proprietary IPGW protocol (5001/TCP). This protocol does not have any authentication features, allowing any attacker capable of communicating with the port in question to invoke (a subset of) desired functionality.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:motorola:moscad_ip_gateway_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:motorola:moscad_ip_gateway:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:motorola:ace_ip_gateway_\(4600\)_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:motorola:ace_ip_gateway_\(4600\):-:*:*:*:*:*:*:*

EPSS

Процентиль: 55%
0.00321
Низкий

7.5 High

CVSS3

Дефекты

CWE-306

Связанные уязвимости

CVSS3: 7.5
github
больше 3 лет назад

The Motorola MOSCAD and ACE line of RTUs through 2022-05-02 omit an authentication requirement. They feature IP Gateway modules which allow for interfacing between Motorola Data Link Communication (MDLC) networks (potentially over a variety of serial, RF and/or Ethernet links) and TCP/IP networks. Communication with RTUs behind the gateway is done by means of the proprietary IPGW protocol (5001/TCP). This protocol does not have any authentication features, allowing any attacker capable of communicating with the port in question to invoke (a subset of) desired functionality.

EPSS

Процентиль: 55%
0.00321
Низкий

7.5 High

CVSS3

Дефекты

CWE-306