6.4
CVE-2020-10277
- EPSS 0.06%
- Veröffentlicht 24.06.2020 05:15:13
- Zuletzt bearbeitet 21.11.2024 04:55:07
- Quelle cve@aliasrobotics.com
- CVE-Watchlists
- Unerledigt
There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually adding a new user with sudo privileges on the machine.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Mobile-industrial-robots ≫ Mir100 Firmware Version <= 2.8.1.1
Mobile-industrial-robots ≫ Mir200 Firmware Version-
Mobile-industrial-robots ≫ Mir250 Firmware Version-
Mobile-industrial-robots ≫ Mir500 Firmware Version-
Mobile-industrial-robots ≫ Mir1000 Firmware Version-
Easyrobotics ≫ Er200 Firmware Version-
Easyrobotics ≫ Er-lite Firmware Version-
Easyrobotics ≫ Er-flex Firmware Version-
Easyrobotics ≫ Er-one Firmware Version-
Uvd-robots ≫ Uvd Firmware Version-
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.06% | 0.151 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.4 | 0.9 | 5.5 |
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H
|
| nvd@nist.gov | 4.6 | 3.9 | 6.4 |
AV:L/AC:L/Au:N/C:P/I:P/A:P
|
| cve@aliasrobotics.com | 6.4 | 0.9 | 5.5 |
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H
|
CWE-656 Reliance on Security Through Obscurity
The product uses a protection mechanism whose strength depends heavily on its obscurity, such that knowledge of its algorithms or key data is sufficient to defeat the mechanism.