MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the internal wireless and wired networks to take control of the robot seamlessly. In combination with CVE-2020-10269 and CVE-2020-10271, this flaw allows malicious actors to command the robot at desire.
References
Link | Resource |
---|---|
https://github.com/aliasrobotics/RVD/issues/2554 | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: Alias
Published: 2020-06-24T00:00:00
Updated: 2020-06-24T04:35:12
Reserved: 2020-03-10T00:00:00
Link: CVE-2020-10272
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-06-24T05:15:12.943
Modified: 2020-07-06T16:21:56.877
Link: CVE-2020-10272
JSON object: View
Redhat Information
No data.
CWE