The Motorola MDLC protocol through 2022-05-02 mishandles...
Critical severity
Unreviewed
Published
Jul 27, 2022
to the GitHub Advisory Database
•
Updated Feb 23, 2024
Description
Published by the National Vulnerability Database
Jul 26, 2022
Published to the GitHub Advisory Database
Jul 27, 2022
Last updated
Feb 23, 2024
The Motorola MDLC protocol through 2022-05-02 mishandles message integrity. It supports three security modes: Plain, Legacy Encryption, and New Encryption. In Legacy Encryption mode, traffic is encrypted via the Tiny Encryption Algorithm (TEA) block-cipher in ECB mode. This mode of operation does not offer message integrity and offers reduced confidentiality above the block level, as demonstrated by an ECB Penguin attack against any block ciphers.
References