Motorola Solutions Vigilant License Plate Readers
Six vulnerabilities affect Motorola Solutions Vigilant Fixed LPR Coms Box devices (firmware version 3.1.171.9 and earlier). Vulnerabilities include: hard-coded wireless access point credentials (CVE-2024-38281), hard-coded web interface credentials (CVE-2024-38282), unencrypted storage of Criminal Justice Information and cached query data (CVE-2024-38280, CVE-2024-38283), credentials and sensitive data exposed in log files (CVE-2024-38284, CVE-2024-38285), and insecure boot partition allowing physical tampering (CVE-2024-38279). Motorola has already remediated CVE-2024-38281, CVE-2024-38283, and CVE-2024-38279 in newer firmware. For CVE-2024-38280, devices shipped after May 10, 2024 include full disk encryption; older devices have had CJI data encrypted in-place. Secure boot implementation is planned for Fall 2024 via OTA update.
- Network access to the device's web interface or wireless access point (typically on-vehicle or local network)
- Valid credentials (or ability to use default/hard-coded credentials for wireless AP)
- For some vulnerabilities: physical access to the device to modify boot configuration
Patching may require device reboot — plan for process interruption
/api/v1/advisories/d42874ce-cf51-44e5-91e5-de680d90da5bGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.