Motorola MOSCAD IP Gateway Firmware

CPE Details

Motorola MOSCAD IP Gateway Firmware
-
2015-12-23
19h40 +00:00
2015-12-23
19h40 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:o:motorola:moscad_ip_gateway_firmware:-:*:*:*:*:*:*:*

Informations

Vendor

motorola

Product

moscad_ip_gateway_firmware

Version

-

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-30276 2022-07-26 20h14 +00:00 The Motorola MOSCAD and ACE line of RTUs through 2022-05-02 omit an authentication requirement. They feature IP Gateway modules which allow for interfacing between Motorola Data Link Communication (MDLC) networks (potentially over a variety of serial, RF and/or Ethernet links) and TCP/IP networks. Communication with RTUs behind the gateway is done by means of the proprietary IPGW protocol (5001/TCP). This protocol does not have any authentication features, allowing any attacker capable of communicating with the port in question to invoke (a subset of) desired functionality.
7.5
Haute
CVE-2015-7935 2015-12-23 01h00 +00:00 Motorola Solutions MOSCAD IP Gateway allows remote attackers to read arbitrary files via unspecified vectors.
7.5
Haute
CVE-2015-7936 2015-12-23 01h00 +00:00 Cross-site request forgery (CSRF) vulnerability in Motorola Solutions MOSCAD IP Gateway allows remote attackers to hijack the authentication of administrators for requests that modify a password.
7.5
Haute