No Updates for MOSCAD Issues
Monday, December 21, 2015 @ 03:12 PM gHale
There are remote file inclusion (RFI) and cross-site request forgery (CSRF) vulnerabilities in Motorola Solutions’ MOSCAD IP Gateway, but the company said it stopped making the product in 2012, according to a report on ICS-CERT.
As a result, Motorola Solutions said since they are no longer making the product, they will no longer offer software updates.
These vulnerabilities, discovered by independent researcher Aditya K. Sood, are remotely exploitable. All versions of MOSCAD IP Gateway suffer from the issue.
A successful exploit of these vulnerabilities could allow a remote attacker to perform actions with the permissions of a valid user.
Motorola Solutions is a U.S.-based company that maintains offices in 60 countries around the world.
The affected product, MOSCAD IP Gateway, is a SCADA system that has some web-based management capabilities. According to Motorola Solutions, MOSCAD IP Gateways see action across several sectors including commercial facilities, critical manufacturing, energy, and water and wastewater systems.
Motorola Solutions estimates that these products see use primarily in the United States and Europe with a small percentage in Asia.
In terms of remote file inclusion, files can end up accessed and downloaded without authentication.
CVE-2015-7935 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.5.
In the cross-site request forgery vulnerability, a request can end up used to update the password because of no tokens.
CVE-2015-7936 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 7.5.
No known public exploits specifically target these vulnerabilities. An attacker with a low skill would be able to exploit these vulnerabilities.
The product ended up discontinued at the end of 2012; click here to get more support information from Motorola Solutions.