The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 allows any attacker connected to the robot networks (wired or wireless) to exfiltrate all stored data (e.g. indoor mapping images) and associated metadata from the robot's database.

Project Subscriptions

Vendors Products
Easyrobotics Subscribe
Er-flex Subscribe
Er-flex Firmware Subscribe
Er-lite Subscribe
Er-lite Firmware Subscribe
Er-one Firmware Subscribe
Er200 Firmware Subscribe
Mobile-industrial-robots Subscribe
Mir1000 Subscribe
Mir1000 Firmware Subscribe
Mir100 Firmware Subscribe
Mir200 Firmware Subscribe
Mir250 Firmware Subscribe
Mir500 Firmware Subscribe
Uvd-robots Subscribe
Uvd Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-2729 The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 allows any attacker connected to the robot networks (wired or wireless) to exfiltrate all stored data (e.g. indoor mapping images) and associated metadata from the robot's database.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Alias

Published:

Updated: 2024-09-17T00:05:33.397Z

Reserved: 2020-03-10T00:00:00

Link: CVE-2020-10274

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-06-24T05:15:13.113

Modified: 2024-11-21T04:55:06.977

Link: CVE-2020-10274

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses