CVE-2022-30273
Severity CVSS v4.0:
Pending analysis
Type:
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
Publication date:
26/07/2022
Last modified:
14/02/2024
Description
The Motorola MDLC protocol through 2022-05-02 mishandles message integrity. It supports three security modes: Plain, Legacy Encryption, and New Encryption. In Legacy Encryption mode, traffic is encrypted via the Tiny Encryption Algorithm (TEA) block-cipher in ECB mode. This mode of operation does not offer message integrity and offers reduced confidentiality above the block level, as demonstrated by an ECB Penguin attack against any block ciphers.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:motorolasolutions:mdlc:4.80.0024:*:*:*:*:*:*:* | ||
| cpe:2.3:a:motorolasolutions:mdlc:4.82.004:*:*:*:*:*:*:* | ||
| cpe:2.3:a:motorolasolutions:mdlc:4.83.001:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



