Lucene search

K

Ace1000 Firmware Security Vulnerabilities

cve
cve

CVE-2022-30269

Motorola ACE1000 RTUs through 2022-05-02 mishandle application integrity. They allow for custom application installation via either STS software, the C toolkit, or the ACE1000 Easy Configurator. In the case of the Easy Configurator, application images (as PLX/DAT/APP/CRC files) are uploaded via the...

8.8CVSS

8.9AI Score

0.001EPSS

2022-07-26 11:15 PM
59
3
cve
cve

CVE-2022-30270

The Motorola ACE1000 RTU through 2022-05-02 has default credentials. It exposes an SSH interface on port 22/TCP. This interface is used for remote maintenance and for SFTP file-transfer operations that are part of engineering software functionality. Access to this interface is controlled by 5 preco...

9.8CVSS

9.3AI Score

0.001EPSS

2022-07-26 11:15 PM
46
4
cve
cve

CVE-2022-30271

The Motorola ACE1000 RTU through 2022-05-02 ships with a hardcoded SSH private key and initialization scripts (such as /etc/init.d/sshd_service) only generate a new key if no private-key file exists. Thus, this hardcoded key is likely to be used by default.

9.8CVSS

9.3AI Score

0.001EPSS

2022-07-26 11:15 PM
44
4
cve
cve

CVE-2022-30272

The Motorola ACE1000 RTU through 2022-05-02 mishandles firmware integrity. It utilizes either the STS software suite or ACE1000 Easy Configurator for performing firmware updates. In case of the Easy Configurator, firmware updates are performed through access to the Web UI where file system, kernel,...

7.2CVSS

7.1AI Score

0.001EPSS

2022-07-26 11:15 PM
44
4
cve
cve

CVE-2022-30274

The Motorola ACE1000 RTU through 2022-05-02 uses ECB encryption unsafely. It can communicate with an XRT LAN-to-radio gateway by means of an embedded client. Credentials for accessing this gateway are stored after being encrypted with the Tiny Encryption Algorithm (TEA) in ECB mode using a hardcode...

9.8CVSS

9.4AI Score

0.001EPSS

2022-07-26 11:15 PM
48
3