6.4
CVE-2020-10277
- EPSS 0.06%
- Published 24.06.2020 05:15:13
- Last modified 21.11.2024 04:55:07
- Source cve@aliasrobotics.com
- Teams watchlist Login
- Open Login
There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually adding a new user with sudo privileges on the machine.
Data is provided by the National Vulnerability Database (NVD)
Mobile-industrial-robots ≫ Mir100 Firmware Version <= 2.8.1.1
Mobile-industrial-robots ≫ Mir200 Firmware Version-
Mobile-industrial-robots ≫ Mir250 Firmware Version-
Mobile-industrial-robots ≫ Mir500 Firmware Version-
Mobile-industrial-robots ≫ Mir1000 Firmware Version-
Easyrobotics ≫ Er200 Firmware Version-
Easyrobotics ≫ Er-lite Firmware Version-
Easyrobotics ≫ Er-flex Firmware Version-
Easyrobotics ≫ Er-one Firmware Version-
Uvd-robots ≫ Uvd Firmware Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.06% | 0.151 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.4 | 0.9 | 5.5 |
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H
|
nvd@nist.gov | 4.6 | 3.9 | 6.4 |
AV:L/AC:L/Au:N/C:P/I:P/A:P
|
cve@aliasrobotics.com | 6.4 | 0.9 | 5.5 |
CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H
|
CWE-656 Reliance on Security Through Obscurity
The product uses a protection mechanism whose strength depends heavily on its obscurity, such that knowledge of its algorithms or key data is sufficient to defeat the mechanism.