CVE-2020-10275
24.06.2020, 05:15
The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to compute the token and interact with the REST API to exfiltrate, infiltrate or delete data.Enginsight
Vendor | Product | Version |
---|---|---|
mobile-industrial-robots | mir100_firmware | 𝑥 ≤ 2.8.1.1 |
mobile-industrial-robots | mir200_firmware | - |
mobile-industrial-robots | mir250_firmware | - |
mobile-industrial-robots | mir500_firmware | - |
mobile-industrial-robots | mir1000_firmware | - |
easyrobotics | er200_firmware | - |
easyrobotics | er-lite_firmware | - |
easyrobotics | er-flex_firmware | - |
easyrobotics | er-one_firmware | - |
uvd-robots | uvd_firmware | - |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-261 - Weak Encoding for PasswordObscuring a password with a trivial encoding does not protect the password.
- CWE-326 - Inadequate Encryption StrengthThe software stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.