CVE-2022-30270

The Motorola ACE1000 RTU through 2022-05-02 has default credentials. It exposes an SSH interface on port 22/TCP. This interface is used for remote maintenance and for SFTP file-transfer operations that are part of engineering software functionality. Access to this interface is controlled by 5 preconfigured accounts (root, abuilder, acelogin, cappl, ace), all of which come with default credentials. Although the ACE1000 documentation mentions the root, abuilder and acelogin accounts and instructs users to change the default credentials, the cappl and ace accounts remain undocumented and thus are unlikely to have their credentials changed.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-06 Mitigation Third Party Advisory US Government Resource
https://www.forescout.com/blog/ Not Applicable
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:motorola:ace1000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:motorola:ace1000:-:*:*:*:*:*:*:*

Information

Published : 2022-07-26 16:15

Updated : 2022-08-02 13:47


NVD link : CVE-2022-30270

Mitre link : CVE-2022-30270


JSON object : View

CWE
CWE-798

Use of Hard-coded Credentials

Advertisement

dedicated server usa

Products Affected

motorola

  • ace1000_firmware
  • ace1000