cvelist/2022/30xxx/CVE-2022-30273.json

72 lines
2.5 KiB
JSON
Raw Normal View History

2022-05-04 21:01:22 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2022-07-26 22:00:50 +00:00
"ID": "CVE-2022-30273",
"STATE": "PUBLIC"
2022-05-04 21:01:22 +00:00
},
2022-07-26 22:00:50 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2022-05-04 21:01:22 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2022-07-26 22:00:50 +00:00
"value": "The Motorola MDLC protocol through 2022-05-02 mishandles message integrity. It supports three security modes: Plain, Legacy Encryption, and New Encryption. In Legacy Encryption mode, traffic is encrypted via the Tiny Encryption Algorithm (TEA) block-cipher in ECB mode. This mode of operation does not offer message integrity and offers reduced confidentiality above the block level, as demonstrated by an ECB Penguin attack against any block ciphers."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.forescout.com/blog/",
"refsource": "MISC",
"name": "https://www.forescout.com/blog/"
},
{
"url": "https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation",
"refsource": "MISC",
"name": "https://en.wikipedia.org/wiki/Block_cipher_mode_of_operation"
},
{
"refsource": "MISC",
"name": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-05",
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-05"
2022-05-04 21:01:22 +00:00
}
]
}
}