Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:motorola:moscad_ip_gateway_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79643AEA-9B7F-4754-9F92-A18087BC23A9", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:motorola:moscad_ip_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F6DB9D2-850C-4C18-866C-7B6FDDB102D0", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:motorola:ace_ip_gateway_\\(4600\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CB0DE72-62FB-4E23-85F6-68AF8D0A0DDA", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:motorola:ace_ip_gateway_\\(4600\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "64ACF2EF-2AA2-4B33-A514-101A64CFEC8B", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "The Motorola MOSCAD and ACE line of RTUs through 2022-05-02 omit an authentication requirement. They feature IP Gateway modules which allow for interfacing between Motorola Data Link Communication (MDLC) networks (potentially over a variety of serial, RF and/or Ethernet links) and TCP/IP networks. Communication with RTUs behind the gateway is done by means of the proprietary IPGW protocol (5001/TCP). This protocol does not have any authentication features, allowing any attacker capable of communicating with the port in question to invoke (a subset of) desired functionality."}, {"lang": "es", "value": "Motorola MOSCAD and ACE line of RTUs versiones hasta 02-05-2022, omiten un requisito de autenticaci\u00f3n. Cuentan con m\u00f3dulos de puerta de enlace IP que permiten la interconexi\u00f3n entre las redes de Comunicaci\u00f3n de Enlace de Datos de Motorola (MDLC) (potencialmente a trav\u00e9s de una variedad de enlaces de serie, RF y/o Ethernet) y las redes TCP/IP. La comunicaci\u00f3n con las RTU detr\u00e1s de la pasarela es realizado mediante el protocolo propietario IPGW (5001/TCP). Este protocolo no presenta ninguna caracter\u00edstica de autenticaci\u00f3n, lo que permite a cualquier atacante capaz de comunicarse con el puerto en cuesti\u00f3n invocar (un subconjunto de) la funcionalidad deseada"}], "id": "CVE-2022-30276", "lastModified": "2024-11-21T07:02:28.993", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2022-07-26T23:15:08.293", "references": [{"source": "cve@mitre.org", "tags": ["Mitigation", "Third Party Advisory", "US Government Resource"], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-04"}, {"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://www.forescout.com/blog/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Mitigation", "Third Party Advisory", "US Government Resource"], "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-04"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://www.forescout.com/blog/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-306"}], "source": "nvd@nist.gov", "type": "Primary"}]}