cve/2022/CVE-2022-30273.md

18 lines
905 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-30273](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30273)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The Motorola MDLC protocol through 2022-05-02 mishandles message integrity. It supports three security modes: Plain, Legacy Encryption, and New Encryption. In Legacy Encryption mode, traffic is encrypted via the Tiny Encryption Algorithm (TEA) block-cipher in ECB mode. This mode of operation does not offer message integrity and offers reduced confidentiality above the block level, as demonstrated by an ECB Penguin attack against any block ciphers.
### POC
#### Reference
- https://www.forescout.com/blog/
#### Github
No PoCs found on GitHub currently.