Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-37241 | An unauthorized user is able to gain access to sensitive data, including credentials, by physically retrieving the hard disk of the product as the data is stored in clear text. |
Solution
Motorola Solutions recommends the following for each identified vulnerability: CVE-2024-38280: * Apply encryption to all Criminal Justice Information (CJI) data. * Apply full disk encryption with LUKS encryption standards and add password protection to the GRUB Bootloader. * Perform column-level encryption for sensitive data in the database. All devices shipped after May 10, 2024 are already using full disk encryption. All devices that are not able to have full disk encryption applied have had all CJI data encrypted. No further actions are required by customers.
Workaround
No workaround given by the vendor.
Thu, 03 Oct 2024 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Motorola
Motorola vigilant Fixed Lpr Coms Box Motorola vigilant Fixed Lpr Coms Box Firmware |
|
Weaknesses | CWE-312 | |
CPEs | cpe:2.3:h:motorola:vigilant_fixed_lpr_coms_box:-:*:*:*:*:*:*:* cpe:2.3:o:motorola:vigilant_fixed_lpr_coms_box_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Motorola
Motorola vigilant Fixed Lpr Coms Box Motorola vigilant Fixed Lpr Coms Box Firmware |
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-02T04:04:25.205Z
Reserved: 2024-06-12T16:16:09.648Z
Link: CVE-2024-38280

Updated: 2024-07-05T20:35:43.342Z

Status : Modified
Published: 2024-06-13T17:15:51.477
Modified: 2024-11-21T09:25:15.823
Link: CVE-2024-38280

No data.

No data.