fkie_cve-2022-30275
Vulnerability from fkie_nvd
Published
2022-07-26 22:15
Modified
2024-11-21 07:02
Summary
The Motorola MOSCAD Toolbox software through 2022-05-02 relies on a cleartext password. It utilizes an MDLC driver to communicate with MOSCAD/ACE RTUs for engineering purposes. Access to these communications is protected by a password stored in cleartext in the wmdlcdrv.ini driver configuration file. In addition, this password is used for access control to MOSCAD/STS projects protected with the Legacy Password feature. In this case, an insecure CRC of the password is present in the project file: this CRC is validated against the password in the driver configuration file.
Impacted products
Vendor Product Version
motorolasolutions mdlc 4.80.0024
motorolasolutions mdlc 4.82.004
motorolasolutions mdlc 4.83.001



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:motorolasolutions:mdlc:4.80.0024:*:*:*:*:*:*:*",
              "matchCriteriaId": "83AC1904-7229-4B7E-919B-9617D9AB2A02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:motorolasolutions:mdlc:4.82.004:*:*:*:*:*:*:*",
              "matchCriteriaId": "824D6C18-5549-4FF0-BAB9-5FD2B457D03C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:motorolasolutions:mdlc:4.83.001:*:*:*:*:*:*:*",
              "matchCriteriaId": "C158107A-2731-47CE-8BA6-A10DD51F1DEE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Motorola MOSCAD Toolbox software through 2022-05-02 relies on a cleartext password. It utilizes an MDLC driver to communicate with MOSCAD/ACE RTUs for engineering purposes. Access to these communications is protected by a password stored in cleartext in the wmdlcdrv.ini driver configuration file. In addition, this password is used for access control to MOSCAD/STS projects protected with the Legacy Password feature. In this case, an insecure CRC of the password is present in the project file: this CRC is validated against the password in the driver configuration file."
    },
    {
      "lang": "es",
      "value": "El software MOSCAD Toolbox de Motorola versiones hasta 02-05-2022, es basado en una contrase\u00f1a en texto sin cifrar. Usa un controlador MDLC para comunicarse con las RTU de MOSCAD/ACE con fines de ingenier\u00eda. El acceso a estas comunicaciones est\u00e1 protegido por una contrase\u00f1a almacenada en texto sin cifrar en el archivo de configuraci\u00f3n del driver wmdlcdrv.ini. Adem\u00e1s, esta contrase\u00f1a es usado para el control de acceso a los proyectos de MOSCAD/STS protegidos con la funci\u00f3n Legacy Password. En este caso, un CRC no seguro de la contrase\u00f1a est\u00e1 presente en el archivo del proyecto: este CRC es comprobado contra la contrase\u00f1a en el archivo de configuraci\u00f3n del controlador."
    }
  ],
  "id": "CVE-2022-30275",
  "lastModified": "2024-11-21T07:02:28.860",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-07-26T22:15:11.273",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-05"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.forescout.com/blog/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-05"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.forescout.com/blog/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-312"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…