The Motorola ACE1000 RTU through 2022-05-02 has default credentials. It exposes an SSH interface on port 22/TCP. This interface is used for remote maintenance and for SFTP file-transfer operations that are part of engineering software functionality. Access to this interface is controlled by 5 preconfigured accounts (root, abuilder, acelogin, cappl, ace), all of which come with default credentials. Although the ACE1000 documentation mentions the root, abuilder and acelogin accounts and instructs users to change the default credentials, the cappl and ace accounts remain undocumented and thus are unlikely to have their credentials changed.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-06 | Mitigation Third Party Advisory US Government Resource |
https://www.forescout.com/blog/ | Not Applicable |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2022-07-26 16:15
Updated : 2022-08-02 13:47
NVD link : CVE-2022-30270
Mitre link : CVE-2022-30270
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
motorola
- ace1000_firmware
- ace1000