10

CVE-2020-10271

Exploit

MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph to all network interfaces, wireless and wired. This is the result of a bad set up and can be mitigated by appropriately configuring ROS and/or applying custom patches as appropriate. Currently, the ROS computational graph can be accessed fully from the wired exposed ports. In combination with other flaws such as CVE-2020-10269, the computation graph can also be fetched and interacted from wireless networks. This allows a malicious operator to take control of the ROS logic and correspondingly, the complete robot given that MiR's operations are centered around the framework (ROS).

Data is provided by the National Vulnerability Database (NVD)
AliasroboticsMir100 Firmware Version <= 2.8.1.1
   AliasroboticsMir100 Version-
AliasroboticsMir200 Firmware Version <= 2.8.1.1
   AliasroboticsMir200 Version-
AliasroboticsMir250 Firmware Version <= 2.8.1.1
   AliasroboticsMir250 Version-
AliasroboticsMir500 Firmware Version <= 2.8.1.1
   AliasroboticsMir500 Version-
AliasroboticsMir1000 Firmware Version <= 2.8.1.1
   AliasroboticsMir1000 Version-
Enabled-roboticsEr-lite Firmware Version <= 2.8.1.1
   Enabled-roboticsEr-lite Version-
Enabled-roboticsEr-flex Firmware Version <= 2.8.1.1
   Enabled-roboticsEr-flex Version-
Enabled-roboticsEr-one Firmware Version <= 2.8.1.1
   Enabled-roboticsEr-one Version-
Uvd-robotsUvd Robots Firmware Version <= 2.8.1.1
   Uvd-robotsUvd Robots Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.44% 0.602
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:P/I:N/A:N
cve@aliasrobotics.com 10 3.9 6
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CWE-668 Exposure of Resource to Wrong Sphere

The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.