Motorola Solutions MOSCAD IP and ACE IP Gateways
1. EXECUTIVE SUMMARY
- CVSS v3 7.5
- ATTENTION: Exploitable remotely
- Vendor: Motorola Solutions
- Equipment: MOSCAD IP Gateway and ACE IP Gateway
- Vulnerability: Missing Authentication for Critical Function
CISA is aware of a public report, known as “OT:ICEFALL” that details vulnerabilities found in multiple operational technology (OT) vendors. CISA is issuing this advisory to provide notice of the reported vulnerabilities and identify baseline mitigations for reducing risks to these and other cybersecurity attacks.
2. RISK EVALUATION
Successful exploitation of this vulnerability could result in manipulation of device configuration.
3. TECHNICAL DETAILS
3.1 AFFECTED PRODUCTS
The following versions of Motorola MDLC are affected:
MOSCAD IP gateway (IPGW): All versions
ACE IP gateway (CPU 4600): All versions
3.2 VULNERABILITY OVERVIEW
3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306
The product lacks authentication features, which could allow any attacker capable of communicating with the port in question to invoke a variety of engineer actions, such as manipulation of RTU configurations or logic/applications.
CVE-2022-30276 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
- CRITICAL INFRASTRUCTURE SECTORS: Multiple
- COUNTRIES/AREAS DEPLOYED: Worldwide
- COMPANY HEADQUARTERS LOCATION: United States
Daniel dos Santos and Jos Wetzels from Forescout Technologies reported this vulnerability to CISA.
Motorola Solutions recommends:
- Use a dedicated LAN between the SCADA and the IPGW.
- For the MOSCAD IPGW, use an external firewall to block all IP except the SCADA.
- For the ACE IPGW, the built-in firewall can block all IP except the SCADA. Instructions can be found in the STS user guide.
For user guide and procedural information mentioned within this report, use the Contact Us form and select “Other” for Product Interest and request the manual for IoT products.
CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:
- Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet.
- Locate control system networks and remote devices behind firewalls and isolate them from the business network.
- When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage at cisa.gov/ics. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
No known public exploits specifically target this vulnerability. This vulnerability has a high attack complexity.