CVE-2020-10274
24.06.2020, 05:15
The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 allows any attacker connected to the robot networks (wired or wireless) to exfiltrate all stored data (e.g. indoor mapping images) and associated metadata from the robot's database.Enginsight
Vendor | Product | Version |
---|---|---|
mobile-industrial-robots | mir100_firmware | 𝑥 ≤ 2.8.1.1 |
mobile-industrial-robots | mir200_firmware | - |
mobile-industrial-robots | mir250_firmware | - |
mobile-industrial-robots | mir500_firmware | - |
mobile-industrial-robots | mir1000_firmware | - |
easyrobotics | er200_firmware | - |
easyrobotics | er-lite_firmware | - |
easyrobotics | er-flex_firmware | - |
easyrobotics | er-one_firmware | - |
uvd-robots | uvd_firmware | - |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-200 - Exposure of Sensitive Information to an Unauthorized ActorThe product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
- CWE-330 - Use of Insufficiently Random ValuesThe software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.