CVE-2020-10272

EUVD-2020-2727
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the internal wireless and wired networks to take control of the robot seamlessly. In combination with CVE-2020-10269 and CVE-2020-10271, this flaw allows malicious actors to command the robot at desire.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AliasCNA
10 CRITICAL
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 64%
Affected Products (NVD)
VendorProductVersion
aliasroboticsmir100_firmware
𝑥
≤ 2.8.1.1
aliasroboticsmir200_firmware
𝑥
≤ 2.8.1.1
aliasroboticsmir250_firmware
𝑥
≤ 2.8.1.1
aliasroboticsmir500_firmware
𝑥
≤ 2.8.1.1
aliasroboticsmir1000_firmware
𝑥
≤ 2.8.1.1
mobile-industrial-roboticser200_firmware
𝑥
≤ 2.8.1.1
enabled-roboticser-lite_firmware
𝑥
≤ 2.8.1.1
enabled-roboticser-flex_firmware
𝑥
≤ 2.8.1.1
enabled-roboticser-one_firmware
𝑥
≤ 2.8.1.1
uvd-robotsuvd_robots_firmware
𝑥
≤ 2.8.1.1
𝑥
= Vulnerable software versions