motorola CVE Vulnerabilities & Metrics

Focus on motorola vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About motorola Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with motorola. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total motorola CVEs: 61
Earliest CVE date: 10 May 1998, 04:00 UTC
Latest CVE date: 31 Jul 2024, 21:15 UTC

Latest CVE reference: CVE-2022-4003

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 2

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -89.47%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -89.47%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical motorola CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.96

Max CVSS: 10.0

Critical CVEs (≥9): 11

CVSS Range vs. Count

Range Count
0.0-3.9 29
4.0-6.9 21
7.0-8.9 23
9.0-10.0 11

CVSS Distribution Chart

Top 5 Highest CVSS motorola CVEs

These are the five CVEs with the highest CVSS scores for motorola, sorted by severity first and recency.

All CVEs for motorola

CVE-2022-4003 motorola vulnerability CVSS: 0 31 Jul 2024, 21:15 UTC

A denial-of-service vulnerability could allow an authenticated user to trigger an internal service restart via a specially crafted API request.

CVE-2022-4002 motorola vulnerability CVSS: 0 31 Jul 2024, 21:15 UTC

A command injection vulnerability could allow an authenticated user to execute operating system commands as root via a specially crafted API request.

CVE-2024-25360 motorola vulnerability CVSS: 0 12 Feb 2024, 16:15 UTC

A hidden interface in Motorola CX2L Router firmware v1.0.1 leaks information regarding the SystemWizardStatus component via sending a crafted request to device_web_ip.

CVE-2024-23630 motorola vulnerability CVSS: 7.7 26 Jan 2024, 00:15 UTC

An arbitrary firmware upload vulnerability exists in the Motorola MR2600. An attacker can exploit this vulnerability to achieve code execution on the device. Authentication is required, however can be bypassed.

CVE-2024-23629 motorola vulnerability CVSS: 7.8 26 Jan 2024, 00:15 UTC

An authentication bypass vulnerability exists in the web component of the Motorola MR2600. An attacker can exploit this vulnerability to access protected URLs and retrieve sensitive information.

CVE-2024-23628 motorola vulnerability CVSS: 7.7 26 Jan 2024, 00:15 UTC

A command injection vulnerability exists in the 'SaveStaticRouteIPv6Params' parameter of the Motorola MR2600. A remote attacker can exploit this vulnerability to achieve command execution. Authentication is required, however can be bypassed.

CVE-2024-23627 motorola vulnerability CVSS: 7.7 26 Jan 2024, 00:15 UTC

A command injection vulnerability exists in the 'SaveStaticRouteIPv4Params' parameter of the Motorola MR2600. A remote attacker can exploit this vulnerability to achieve command execution. Authentication is required, however can be bypassed.

CVE-2024-23626 motorola vulnerability CVSS: 7.7 26 Jan 2024, 00:15 UTC

A command injection vulnerability exists in the ‘SaveSysLogParams’ parameter of the Motorola MR2600. A remote attacker can exploit this vulnerability to achieve command execution. Authentication is required, however can be bypassed.

CVE-2022-27813 motorola vulnerability CVSS: 0 19 Oct 2023, 10:15 UTC

Motorola MTM5000 series firmwares lack properly configured memory protection of pages shared between the OMAP-L138 ARM and DSP cores. The SoC provides two memory protection units, MPU1 and MPU2, to enforce the trust boundary between the two cores. Since both units are left unconfigured by the firmwares, an adversary with control over either core can trivially gain code execution on the other, by overwriting code located in shared RAM or DDR2 memory regions.

CVE-2022-26943 motorola vulnerability CVSS: 0 19 Oct 2023, 10:15 UTC

The Motorola MTM5000 series firmwares generate TETRA authentication challenges using a PRNG using a tick count register as its sole entropy source. Low boottime entropy and limited re-seeding of the pool renders the authentication challenge vulnerable to two attacks. First, due to the limited boottime pool entropy, an adversary can derive the contents of the entropy pool by an exhaustive search of possible values, based on an observed authentication challenge. Second, an adversary can use knowledge of the entropy pool to predict authentication challenges. As such, the unit is vulnerable to CVE-2022-24400.

CVE-2022-26942 motorola vulnerability CVSS: 0 19 Oct 2023, 10:15 UTC

The Motorola MTM5000 series firmwares lack pointer validation on arguments passed to trusted execution environment (TEE) modules. Two modules are used, one responsible for KVL key management and the other for TETRA cryptographic functionality. In both modules, an adversary with non-secure supervisor level code execution can exploit the issue in order to gain secure supervisor code execution within the TEE. This constitutes a full break of the TEE module, exposing the device key as well as any TETRA cryptographic keys and the confidential TETRA cryptographic primitives.

CVE-2022-26941 motorola vulnerability CVSS: 0 19 Oct 2023, 10:15 UTC

A format string vulnerability exists in Motorola MTM5000 series firmware AT command handler for the AT+CTGL command. An attacker-controllable string is improperly handled, allowing for a write-anything-anywhere scenario. This can be leveraged to obtain arbitrary code execution inside the teds_app binary, which runs with root privileges.

CVE-2023-23774 motorola vulnerability CVSS: 0 29 Aug 2023, 09:15 UTC

Motorola EBTS/MBTS Site Controller drops to debug prompt on unhandled exception. The Motorola MBTS Site Controller exposes a debug prompt on the device's serial port in case of an unhandled exception. This allows an attacker with physical access that is able to trigger such an exception to extract secret key material and/or gain arbitrary code execution on the device.

CVE-2023-23773 motorola vulnerability CVSS: 0 29 Aug 2023, 09:15 UTC

Motorola EBTS/MBTS Base Radio fails to check firmware authenticity. The Motorola MBTS Base Radio lacks cryptographic signature validation for firmware update packages, allowing an authenticated attacker to gain arbitrary code execution, extract secret key material, and/or leave a persistent implant on the device.

CVE-2023-23772 motorola vulnerability CVSS: 0 29 Aug 2023, 09:15 UTC

Motorola MBTS Site Controller fails to check firmware update authenticity. The Motorola MBTS Site Controller lacks cryptographic signature validation for firmware update packages, allowing an authenticated attacker to gain arbitrary code execution, extract secret key material, and/or leave a persistent implant on the device.

CVE-2023-23771 motorola vulnerability CVSS: 0 29 Aug 2023, 09:15 UTC

Motorola MBTS Base Radio accepts hard-coded backdoor password. The Motorola MBTS Base Radio Man Machine Interface (MMI), allowing for service technicians to diagnose and configure the device, accepts a hard-coded backdoor password that cannot be changed or disabled.

CVE-2023-23770 motorola vulnerability CVSS: 0 29 Aug 2023, 09:15 UTC

Motorola MBTS Site Controller accepts hard-coded backdoor password. The Motorola MBTS Site Controller Man Machine Interface (MMI), allowing for service technicians to diagnose and configure the device, accepts a hard-coded backdoor password that cannot be changed or disabled.

CVE-2023-31531 motorola vulnerability CVSS: 0 11 May 2023, 22:15 UTC

Motorola CX2L Router 1.0.1 was discovered to contain a command injection vulnerability via the tomography_ping_number parameter.

CVE-2023-31530 motorola vulnerability CVSS: 0 11 May 2023, 22:15 UTC

Motorola CX2L Router 1.0.1 was discovered to contain a command injection vulnerability via the smartqos_priority_devices parameter.

CVE-2023-31529 motorola vulnerability CVSS: 0 11 May 2023, 22:15 UTC

Motorola CX2L Router 1.0.1 was discovered to contain a command injection vulnerability via the system_time_timezone parameter.

CVE-2023-31528 motorola vulnerability CVSS: 0 11 May 2023, 22:15 UTC

Motorola CX2L Router 1.0.1 was discovered to contain a command injection vulnerability via the staticroute_list parameter.

CVE-2022-34885 motorola vulnerability CVSS: 0 30 Jan 2023, 22:15 UTC

An improper input sanitization vulnerability in the Motorola MR2600 router could allow a local user with elevated permissions to execute arbitrary code.

CVE-2022-3917 motorola vulnerability CVSS: 0 14 Dec 2022, 22:15 UTC

Improper access control of bootloader function was discovered in Motorola Mobility Motorola e20 prior to version RONS31.267-38-8 allows attacker with local access to read partition or RAM data.

CVE-2022-30276 motorola vulnerability CVSS: 0 26 Jul 2022, 23:15 UTC

The Motorola MOSCAD and ACE line of RTUs through 2022-05-02 omit an authentication requirement. They feature IP Gateway modules which allow for interfacing between Motorola Data Link Communication (MDLC) networks (potentially over a variety of serial, RF and/or Ethernet links) and TCP/IP networks. Communication with RTUs behind the gateway is done by means of the proprietary IPGW protocol (5001/TCP). This protocol does not have any authentication features, allowing any attacker capable of communicating with the port in question to invoke (a subset of) desired functionality.

CVE-2022-30274 motorola vulnerability CVSS: 0 26 Jul 2022, 23:15 UTC

The Motorola ACE1000 RTU through 2022-05-02 uses ECB encryption unsafely. It can communicate with an XRT LAN-to-radio gateway by means of an embedded client. Credentials for accessing this gateway are stored after being encrypted with the Tiny Encryption Algorithm (TEA) in ECB mode using a hardcoded key. Similarly, the ACE1000 RTU can route MDLC traffic over Extended Command and Management Protocol (XCMP) and Network Layer (XNL) networks via the MDLC driver. Authentication to the XNL port is protected by TEA in ECB mode using a hardcoded key.

CVE-2022-30272 motorola vulnerability CVSS: 0 26 Jul 2022, 23:15 UTC

The Motorola ACE1000 RTU through 2022-05-02 mishandles firmware integrity. It utilizes either the STS software suite or ACE1000 Easy Configurator for performing firmware updates. In case of the Easy Configurator, firmware updates are performed through access to the Web UI where file system, kernel, package, bundle, or application images can be installed. Firmware updates for the Front End Processor (FEP) module are performed via access to the SSH interface (22/TCP), where a .hex file image is transferred and a bootloader script invoked. File system, kernel, package, and bundle updates are supplied as RPM (RPM Package Manager) files while FEP updates are supplied as S-rec files. In all cases, firmware images were found to have no authentication (in the form of firmware signing) and only relied on insecure checksums for regular integrity checks.

CVE-2022-30271 motorola vulnerability CVSS: 0 26 Jul 2022, 23:15 UTC

The Motorola ACE1000 RTU through 2022-05-02 ships with a hardcoded SSH private key and initialization scripts (such as /etc/init.d/sshd_service) only generate a new key if no private-key file exists. Thus, this hardcoded key is likely to be used by default.

CVE-2022-30270 motorola vulnerability CVSS: 0 26 Jul 2022, 23:15 UTC

The Motorola ACE1000 RTU through 2022-05-02 has default credentials. It exposes an SSH interface on port 22/TCP. This interface is used for remote maintenance and for SFTP file-transfer operations that are part of engineering software functionality. Access to this interface is controlled by 5 preconfigured accounts (root, abuilder, acelogin, cappl, ace), all of which come with default credentials. Although the ACE1000 documentation mentions the root, abuilder and acelogin accounts and instructs users to change the default credentials, the cappl and ace accounts remain undocumented and thus are unlikely to have their credentials changed.

CVE-2022-30269 motorola vulnerability CVSS: 0 26 Jul 2022, 23:15 UTC

Motorola ACE1000 RTUs through 2022-05-02 mishandle application integrity. They allow for custom application installation via either STS software, the C toolkit, or the ACE1000 Easy Configurator. In the case of the Easy Configurator, application images (as PLX/DAT/APP/CRC files) are uploaded via the Web UI. In case of the C toolkit, they are transferred and installed using SFTP/SSH. In each case, application images were found to have no authentication (in the form of firmware signing) and only relied on insecure checksums for regular integrity checks.

CVE-2021-3459 motorola vulnerability CVSS: 7.2 17 Aug 2021, 17:15 UTC

A privilege escalation vulnerability was reported in the MM1000 device configuration web server, which could allow privileged shell access and/or arbitrary privileged commands to be executed on the adapter.

CVE-2021-3458 motorola vulnerability CVSS: 2.1 17 Aug 2021, 17:15 UTC

The Motorola MM1000 device configuration portal can be accessed without authentication, which could allow adapter settings to be modified.

CVE-2020-21937 motorola vulnerability CVSS: 10.0 21 Jul 2021, 15:15 UTC

An command injection vulnerability in HNAP1/SetWLanApcliSettings of Motorola CX2 router CX 1.0.2 Build 20190508 Rel.97360n allows attackers to execute arbitrary system commands.

CVE-2020-21936 motorola vulnerability CVSS: 5.0 21 Jul 2021, 15:15 UTC

An issue in HNAP1/GetMultipleHNAPs of Motorola CX2 router CX 1.0.2 Build 20190508 Rel.97360n allows attackers to access the components GetStationSettings, GetWebsiteFilterSettings and GetNetworkSettings without authentication.

CVE-2020-21935 motorola vulnerability CVSS: 7.5 21 Jul 2021, 15:15 UTC

A command injection vulnerability in HNAP1/GetNetworkTomographySettings of Motorola CX2 router CX 1.0.2 Build 20190508 Rel.97360n allows attackers to execute arbitrary code.

CVE-2020-21934 motorola vulnerability CVSS: 5.0 21 Jul 2021, 15:15 UTC

An issue was discovered in Motorola CX2 router CX 1.0.2 Build 20190508 Rel.97360n where authentication to download the Syslog could be bypassed.

CVE-2020-21933 motorola vulnerability CVSS: 5.0 21 Jul 2021, 15:15 UTC

An issue was discovered in Motorola CX2 router CX 1.0.2 Build 20190508 Rel.97360n where the admin password and private key could be found in the log tar package.

CVE-2020-21932 motorola vulnerability CVSS: 5.0 21 Jul 2021, 15:15 UTC

A vulnerability in /Login.html of Motorola CX2 router CX 1.0.2 Build 20190508 Rel.97360n allows attackers to bypass login and obtain a partially authorized token and uid.

CVE-2021-3460 motorola vulnerability CVSS: 7.5 13 Apr 2021, 21:15 UTC

The Motorola MH702x devices, prior to version 2.0.0.301, do not properly verify the server certificate during communication with the support server which could lead to the communication channel being accessible by an attacker.

CVE-2020-10874 motorola vulnerability CVSS: 5.0 23 Mar 2020, 21:15 UTC

Motorola FX9500 devices allow remote attackers to read database files.

CVE-2019-16257 motorola vulnerability CVSS: 7.5 12 Sep 2019, 13:15 UTC

Some Motorola devices include the SIMalliance Toolbox Browser (aka S@T Browser) on the UICC, which might allow remote attackers to retrieve location and IMEI information, or retrieve other data or execute certain commands, via SIM Toolkit (STK) instructions in an SMS message, aka Simjacker.

CVE-2019-15513 motorola vulnerability CVSS: 7.8 23 Aug 2019, 07:15 UTC

An issue was discovered in OpenWrt libuci (aka Library for the Unified Configuration Interface) before 15.05.1 as used on Motorola CX2L MWR04L 1.01 and C1 MWR03 1.01 devices. /tmp/.uci/network locking is mishandled after reception of a long SetWanSettings command, leading to a device hang.

CVE-2019-13129 motorola vulnerability CVSS: 7.8 01 Jul 2019, 15:15 UTC

On the Motorola router CX2L MWR04L 1.01, there is a stack consumption (infinite recursion) issue in scopd via TCP port 8010 and UDP port 8080. It is caused by snprintf and inappropriate length handling.

CVE-2019-12297 motorola vulnerability CVSS: 7.5 23 May 2019, 14:29 UTC

An issue was discovered in scopd on Motorola routers CX2 1.01 and M2 1.01. There is a Use of an Externally Controlled Format String, reachable via TCP port 8010 or UDP port 8080.

CVE-2019-11322 motorola vulnerability CVSS: 7.5 18 Apr 2019, 17:29 UTC

An issue was discovered in Motorola CX2 1.01 and M2 1.01. There is a command injection in the function startRmtAssist in hnap, which leads to remote code execution via shell metacharacters in a JSON value.

CVE-2019-11321 motorola vulnerability CVSS: 5.0 18 Apr 2019, 17:29 UTC

An issue was discovered in Motorola CX2 1.01 and M2 1.01. The router opens TCP port 8010. Users can send hnap requests to this port without authentication to obtain information such as the MAC addresses of connected client devices.

CVE-2019-11320 motorola vulnerability CVSS: 7.5 18 Apr 2019, 17:29 UTC

In Motorola CX2 1.01 and M2 1.01, users can access the router's /priv_mgt.html web page to launch telnetd, as demonstrated by the 192.168.51.1 address.

CVE-2019-11319 motorola vulnerability CVSS: 7.5 18 Apr 2019, 17:29 UTC

An issue was discovered in Motorola CX2 1.01 and M2 1.01. There is a command injection in the function downloadFirmware in hnap, which leads to remote code execution via shell metacharacters in a JSON value.

CVE-2019-9121 motorola vulnerability CVSS: 10.0 07 Mar 2019, 23:29 UTC

An issue was discovered on Motorola C1 and M2 devices with firmware 1.01 and 1.07 respectively. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the system function with untrusted input from the request body for the SetSmartQoSSettings API function, as demonstrated by shell metacharacters in the smartqos_priority_devices field.

CVE-2019-9120 motorola vulnerability CVSS: 10.0 07 Mar 2019, 23:29 UTC

An issue was discovered on Motorola C1 and M2 devices with firmware 1.01 and 1.07 respectively. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the system function with untrusted input from the request body for the SetWLanACLSettings API function, as demonstrated by shell metacharacters in the wl(0).(0)_maclist field.

CVE-2019-9119 motorola vulnerability CVSS: 10.0 07 Mar 2019, 23:29 UTC

An issue was discovered on Motorola C1 and M2 devices with firmware 1.01 and 1.07 respectively. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the system function with untrusted input from the request body for the SetStaticRouteSettings API function, as demonstrated by shell metacharacters in the staticroute_list field.

CVE-2019-9118 motorola vulnerability CVSS: 10.0 07 Mar 2019, 23:29 UTC

An issue was discovered on Motorola C1 and M2 devices with firmware 1.01 and 1.07 respectively. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the system function with untrusted input from the request body for the SetNTPServerSettings API function, as demonstrated by shell metacharacters in the system_time_timezone field.

CVE-2019-9117 motorola vulnerability CVSS: 10.0 07 Mar 2019, 23:29 UTC

An issue was discovered on Motorola C1 and M2 devices with firmware 1.01 and 1.07 respectively. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the system function with untrusted input from the request body for the SetNetworkTomographySettings API function, as demonstrated by shell metacharacters in the tomography_ping_number field.

CVE-2018-20399 motorola vulnerability CVSS: 5.0 23 Dec 2018, 21:29 UTC

Motorola SBG901 SBG901-2.10.1.1-GA-00-581-NOSH, SBG941 SBG941-2.11.0.0-GA-07-624-NOSH, and SVG1202 SVG1202-2.1.0.0-GA-14-LTSH devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.

CVE-2018-12499 motorola vulnerability CVSS: 5.8 02 Jul 2018, 16:29 UTC

The Motorola MBP853 firmware does not correctly validate server certificates. This allows for a Man in The Middle (MiTM) attack to take place between a Motorola MBP853 camera and the servers it communicates with. In one such instance, it was identified that the device was downloading what appeared to be a client certificate.

CVE-2017-9498 motorola vulnerability CVSS: 2.1 31 Jul 2017, 03:29 UTC

The Comcast firmware on Motorola MX011ANM (firmware version MX011AN_2.9p6s1_PROD_sey) and Xfinity XR11-20 Voice Remote devices allows local users to upload arbitrary firmware images to an XR11 by leveraging root access. In other words, there is no protection mechanism involving digital signatures for the firmware.

CVE-2017-9495 motorola vulnerability CVSS: 2.1 31 Jul 2017, 03:29 UTC

The Comcast firmware on Motorola MX011ANM (firmware version MX011AN_2.9p6s1_PROD_sey) devices allows physically proximate attackers to read arbitrary files by pressing "EXIT, Down, Down, 2" on an RF4CE remote to reach the diagnostic display, and then launching a Remote Web Inspector script.

CVE-2017-9494 motorola vulnerability CVSS: 5.0 31 Jul 2017, 03:29 UTC

The Comcast firmware on Motorola MX011ANM (firmware version MX011AN_2.9p6s1_PROD_sey) devices allows remote attackers to enable a Remote Web Inspector that is accessible from the public Internet.

CVE-2015-7936 motorola vulnerability CVSS: 6.8 23 Dec 2015, 03:59 UTC

Cross-site request forgery (CSRF) vulnerability in Motorola Solutions MOSCAD IP Gateway allows remote attackers to hijack the authentication of administrators for requests that modify a password.

CVE-2015-7935 motorola vulnerability CVSS: 5.0 23 Dec 2015, 03:59 UTC

Motorola Solutions MOSCAD IP Gateway allows remote attackers to read arbitrary files via unspecified vectors.

CVE-2015-1496 motorola vulnerability CVSS: 7.2 16 Feb 2015, 15:59 UTC

Motorola Scanner SDK uses weak permissions for (1) CoreScanner.exe, (2) rsmdriverproviderservice.exe, and (3) ScannerService.exe, which allows local users to gain privileges via unspecified vectors.

CVE-2015-1495 motorola vulnerability CVSS: 6.8 16 Feb 2015, 15:59 UTC

Multiple stack-based buffer overflows in Motorola Scanner SDK allow remote attackers to execute arbitrary code via a crafted string to the Open method in (1) IOPOSScanner.ocx or (2) IOPOSScale.ocx.

CVE-2013-5933 motorola vulnerability CVSS: 6.9 25 Sep 2013, 10:31 UTC

Stack-based buffer overflow in the sub_E110 function in init in a certain configuration of Android 2.3.7 on the Motorola Defy XT phone for Republic Wireless allows local users to gain privileges or cause a denial of service (memory corruption) by writing a long string to the /dev/socket/init_runit socket that is inconsistent with a certain length value that was previously written to this socket.

CVE-2013-4777 motorola vulnerability CVSS: 6.9 25 Sep 2013, 10:31 UTC

A certain configuration of Android 2.3.7 on the Motorola Defy XT phone for Republic Wireless uses init to create a /dev/socket/init_runit socket that listens for shell commands, which allows local users to gain privileges by interacting with a LocalSocket object.

CVE-2013-3051 motorola vulnerability CVSS: 6.2 13 Apr 2013, 10:56 UTC

The TrustZone kernel, when used in conjunction with a certain Motorola build of Android 4.1.2, on Motorola Razr HD, Razr M, and Atrix HD devices with the Qualcomm MSM8960 chipset does not verify the association between a certain physical-address argument and a memory region, which allows local users to unlock the bootloader by using kernel mode to perform crafted 0x9 and 0x2 SMC operations, a different vulnerability than CVE-2013-2596.

CVE-2013-2596 motorola vulnerability CVSS: 6.9 13 Apr 2013, 02:59 UTC

Integer overflow in the fb_mmap function in drivers/video/fbmem.c in the Linux kernel before 3.8.9, as used in a certain Motorola build of Android 4.1.2 and other products, allows local users to create a read-write memory mapping for the entirety of kernel memory, and consequently gain privileges, via crafted /dev/graphics/fb0 mmap2 system calls, as demonstrated by the Motochopper pwn program.

CVE-2010-2307 motorola vulnerability CVSS: 5.0 16 Jun 2010, 20:30 UTC

Multiple directory traversal vulnerabilities in the web server for Motorola SURFBoard cable modem SBV6120E running firmware SBV6X2X-1.0.0.5-SCM-02-SHPC allow remote attackers to read arbitrary files via (1) "//" (multiple leading slash), (2) ../ (dot dot) sequences, and encoded dot dot sequences in a URL request.

CVE-2009-1394 motorola vulnerability CVSS: 9.3 26 Jun 2009, 18:30 UTC

Stack-based buffer overflow in Motorola Timbuktu Pro 8.6.5 on Windows allows remote attackers to execute arbitrary code by sending a long malformed string over the PlughNTCommand named pipe.

CVE-2009-0393 motorola vulnerability CVSS: 3.5 03 Feb 2009, 01:30 UTC

Cross-site scripting (XSS) vulnerability in sysconf.cgi in Motorola Wimax modem CPEi300 allows remote authenticated users to inject arbitrary web script or HTML via the page parameter.

CVE-2009-0392 motorola vulnerability CVSS: 6.8 03 Feb 2009, 01:30 UTC

Directory traversal vulnerability in sysconf.cgi in Motorola Wimax modem CPEi300 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the page parameter.

CVE-2008-2548 motorola vulnerability CVSS: 9.3 04 Jun 2008, 19:32 UTC

Stack-based buffer overflow in the JPEG thumbprint component in the EXIF parser on Motorola cell phones with RAZR firmware allows user-assisted remote attackers to execute arbitrary code via an MMS transmission of a malformed JPEG image, which triggers memory corruption.

CVE-2008-2002 motorola vulnerability CVSS: 7.8 28 Apr 2008, 20:05 UTC

Multiple cross-site request forgery (CSRF) vulnerabilities on Motorola Surfboard with software SB5100-2.3.3.0-SCM00-NOSH allow remote attackers to (1) cause a denial of service (device reboot) via the "Restart Cable Modem" value in the BUTTON_INPUT parameter to configdata.html, and (2) cause a denial of service (hard reset) via the "Reset All Defaults" value in the BUTTON_INPUT parameter to configdata.html.

CVE-2007-5761 motorola vulnerability CVSS: 7.2 09 Jan 2008, 00:46 UTC

The NantSys device 5.0.0.115 in Motorola netOctopus 5.1.2 build 1011 has weak permissions for the \\.\NantSys device interface (nantsys.sys), which allows local users to gain privileges or cause a denial of service (system crash), as demonstrated by modifying the SYSENTER_EIP_MSR CPU Model Specific Register (MSR) value.

CVE-2007-4221 motorola vulnerability CVSS: 10.0 29 Aug 2007, 01:17 UTC

Multiple buffer overflows in Motorola Timbuktu Pro before 8.6.5 for Windows allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via (1) a long user name and (2) certain malformed requests; and (3) allow remote Timbuktu servers to have an unknown impact via a malformed HELLO response, related to the Scanner component and possibly related to a malformed computer name.

CVE-2007-4220 motorola vulnerability CVSS: 7.8 29 Aug 2007, 01:17 UTC

Directory traversal vulnerability in Motorola Timbuktu Pro before 8.6.5 for Windows allows remote attackers to create or delete arbitrary files via a .. (dot dot) in a Send request, probably related to the (1) Send and (2) Exchange services.

CVE-2007-0522 motorola vulnerability CVSS: 3.3 26 Jan 2007, 01:28 UTC

The Motorola MOTORAZR V3 phone allows remote attackers to cause a denial of service (continual modal dialogs and UI unavailability) by repeatedly trying to OBEX push a file over Bluetooth, as demonstrated by ussp-push.

CVE-2006-5196 motorola vulnerability CVSS: 7.8 10 Oct 2006, 04:06 UTC

The HTTP interface in the Motorola SURFboard SB4200 Cable Modem allows remote attackers to cause a denial of service (device crash) via a request with MfcISAPICommand set to SecretProc and a long string in the Secret parameter.

CVE-2006-1366 motorola vulnerability CVSS: 7.8 23 Mar 2006, 23:06 UTC

Buffer overflow in the Motorola PEBL U6 08.83.76R, and possibly other Motorola P2K-based phones, allows remote attackers to cause a denial of service (device shutdown), and possibly execute arbitrary code, via a long OBEX setpath to the OBEX File Transfer (aka FTP) service on Bluetooth channel 9.

CVE-2006-1367 motorola vulnerability CVSS: 6.8 23 Mar 2006, 23:06 UTC

The Motorola PEBL U6 08.83.76R, the Motorola V600, and possibly the Motorola E398 and other Motorola P2K-based phones does not require pairing for a connection related to the Headset Audio Gateway service, which allows user-assisted remote attackers to obtain AT level access and view phonebook entries and saved SMS messages by connecting on Bluetooth channel 3 and tricking the user into pressing Grant, aka a "Blueline" attack. NOTE: while user-assisted, the attack is made more feasible because of a GUI misrepresentation issue that allows a default message to be replaced by an attacker-specified one.

CVE-2006-1365 motorola vulnerability CVSS: 5.0 23 Mar 2006, 23:06 UTC

The Motorola PEBL U6, the Motorola V600, and possibly the Motorola E398 and other Motorola phones allow remote attackers to add an entry for their own Bluetooth device to a target device's list of trusted devices (aka Device History), and possibly obtain AT level access to the target device, by initiating and interrupting an OBEX Push Profile that pretends to send a vCard, aka a "HeloMoto" attack.

CVE-2005-4215 motorola vulnerability CVSS: 7.8 14 Dec 2005, 11:03 UTC

Motorola SB5100E Cable Modem allows remote attackers to cause a denial of service (device crash) via an IP packet with the same source and destination IPs and ports, and with the SYN flag set (aka LAND).

CVE-2004-1550 motorola vulnerability CVSS: 7.5 31 Dec 2004, 05:00 UTC

Motorola Wireless Router WR850G running firmware 4.03 allows remote attackers to bypass authentication, log on as an administrator, and obtain sensitive information by repeatedly making an HTTP request for ver.asp until an administrator logs on.

CVE-2002-1944 motorola vulnerability CVSS: 5.0 31 Dec 2002, 05:00 UTC

Motorola Surfboard 4200 cable modem allows remote attackers to cause a denial of service (crash) by performing a SYN scan using a tool such as nmap.

CVE-1999-0816 motorola vulnerability CVSS: 10.0 10 May 1998, 04:00 UTC

The Motorola CableRouter allows any remote user to connect to and configure the router on port 1024.

CVE-1999-0919 motorola vulnerability CVSS: 10.0 10 May 1998, 04:00 UTC

A memory leak in a Motorola CableRouter allows remote attackers to conduct a denial of service via a large number of telnet connections.