Motorola Solutions ACE1000
The Motorola ACE1000 remote terminal unit contains five critical vulnerabilities: CVE-2022-30269 and CVE-2022-30272: Insecure firmware download and installation procedures allow attackers to inject malicious code without proper verification. CVE-2022-30271: Hardcoded or weak SSH private keys in the device allow attackers to authenticate as the RTU without valid credentials. CVE-2022-30270: Default or weak administrator passwords are present, allowing unauthorized administrative access. CVE-2022-30274: A related vulnerability in MOTOTRBO Capacity systems. Successful exploitation could allow an attacker to manipulate RTU configuration, cause denial of service, or achieve remote code execution on the device managing your water/electrical distribution infrastructure.
- Network access to the ACE1000 (port 22 for SSH, HTTP/HTTPS for web interface, or DNP3/MODBUS ports)
- No valid credentials required for some attack vectors (hardcoded credentials and default access)
- For password-based attacks: knowledge of weak default or common administrator passwords
Patching may require device reboot — plan for process interruption
/api/v1/advisories/221e157e-f2c2-4e76-b539-900b0f8be11c