Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-30269


Motorola ACE1000 RTUs through 2022-05-02 mishandle application integrity. They allow for custom application installation via either STS software, the C toolkit, or the ACE1000 Easy Configurator. In the case of the Easy Configurator, application images (as PLX/DAT/APP/CRC files) are uploaded via the Web UI. In case of the C toolkit, they are transferred and installed using SFTP/SSH. In each case, application images were found to have no authentication (in the form of firmware signing) and only relied on insecure checksums for regular integrity checks.


Published

2022-07-26T23:15:08.097

Last Modified

2024-11-21T07:02:27.923

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.8 (HIGH)

Weaknesses
  • Type: Primary
    CWE-345

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System motorola ace1000_firmware - Yes
Hardware motorola ace1000 - No

References