CVE-2020-10272

MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the internal wireless and wired networks to take control of the robot seamlessly. In combination with CVE-2020-10269 and CVE-2020-10271, this flaw allows malicious actors to command the robot at desire.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AliasCNA
10 CRITICAL
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 63%
VendorProductVersion
aliasroboticsmir100_firmware
𝑥
≤ 2.8.1.1
aliasroboticsmir200_firmware
𝑥
≤ 2.8.1.1
aliasroboticsmir250_firmware
𝑥
≤ 2.8.1.1
aliasroboticsmir500_firmware
𝑥
≤ 2.8.1.1
aliasroboticsmir1000_firmware
𝑥
≤ 2.8.1.1
mobile-industrial-roboticser200_firmware
𝑥
≤ 2.8.1.1
enabled-roboticser-lite_firmware
𝑥
≤ 2.8.1.1
enabled-roboticser-flex_firmware
𝑥
≤ 2.8.1.1
enabled-roboticser-one_firmware
𝑥
≤ 2.8.1.1
uvd-robotsuvd_robots_firmware
𝑥
≤ 2.8.1.1
𝑥
= Vulnerable software versions