Default Credential Vulnerability in Motorola ACE1000 Remote Terminal Unit
CVE-2022-30270

9.8CRITICAL

Key Information:

Vendor
Motorola
Vendor
CVE Published:
26 July 2022

Summary

The Motorola ACE1000 RTU is impacted by a vulnerability associated with the use of default credentials for its preconfigured accounts. It offers an SSH interface on port 22/TCP for remote maintenance and SFTP file transfers essential for its engineering operations. The presence of five accounts (root, abuilder, acelogin, cappl, and ace), which come with default credentials, poses a significant security risk. While the documentation advises changing credentials for root, abuilder, and acelogin, the undocumented accounts (cappl and ace) are less likely to have their credentials altered, leaving them exposed. This vulnerability highlights the need for stronger security practices and immediate remediation.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.