mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
100 lines
3.6 KiB
JSON
100 lines
3.6 KiB
JSON
{
|
|
"id": "CVE-2022-30270",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2022-07-26T23:15:08.137",
|
|
"lastModified": "2023-08-08T14:22:24.967",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The Motorola ACE1000 RTU through 2022-05-02 has default credentials. It exposes an SSH interface on port 22/TCP. This interface is used for remote maintenance and for SFTP file-transfer operations that are part of engineering software functionality. Access to this interface is controlled by 5 preconfigured accounts (root, abuilder, acelogin, cappl, ace), all of which come with default credentials. Although the ACE1000 documentation mentions the root, abuilder and acelogin accounts and instructs users to change the default credentials, the cappl and ace accounts remain undocumented and thus are unlikely to have their credentials changed."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Motorola ACE1000 RTU versiones hasta 02-05-2022, presenta credenciales por defecto. Expone una interfaz SSH en el puerto 22/TCP. Esta interfaz es usada para el mantenimiento remoto y para las operaciones de transferencia de archivos SFTP que forman parte de la funcionalidad del software de ingenier\u00eda. El acceso a esta interfaz est\u00e1 controlado por 5 cuentas preconfiguradas (root, abuilder, acelogin, cappl, ace), todas ellas con credenciales por defecto. Aunque la documentaci\u00f3n del ACE1000 menciona las cuentas root, abuilder y acelogin e instruye a usuarios para que cambien las credenciales por defecto, las cuentas cappl y ace permanecen sin documentar y, por lo tanto, es poco probable que sean cambiadas sus credenciales"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL"
|
|
},
|
|
"exploitabilityScore": 3.9,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-287"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:motorola:ace1000_firmware:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D94120E5-38DE-44EF-B1D6-C418DC816D25"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:h:motorola:ace1000:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D16356CC-9056-4675-8DBE-EF395A5529E8"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-06",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Mitigation",
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://www.forescout.com/blog/",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Not Applicable"
|
|
]
|
|
}
|
|
]
|
|
} |