Motorola Solutions MDLC
Motorola Solutions MDLC contains two vulnerabilities affecting encrypted communication and credential storage. CVE-2022-30273 involves weak encryption in the MDLC protocol when using the legacy TEA encryption algorithm instead of AES256, allowing potential message manipulation and protocol parser exploitation. CVE-2022-30275 involves plaintext password storage in the MDLC Windows driver on systems using the nonsecured MDLC protocol variant, exposing credentials to local or network-based attackers who gain access to configuration files or traffic.
- Network access to MDLC protocol traffic or device management interface
- System configured with legacy TEA encryption (CVE-2022-30273) or nonsecured MDLC protocol variant (CVE-2022-30275)
- For password exploitation: access to Windows driver configuration files or ability to intercept unencrypted management traffic
Patching may require device reboot — plan for process interruption
/api/v1/advisories/858bfe76-1d45-4a68-b182-d43f47022387Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.