CVE-2020-10280
- EPSS 0.33%
- Published 24.06.2020 06:15:11
- Last modified 21.11.2024 04:55:07
The Apache server on port 80 that host the web interface is vulnerable to a DoS by spamming incomplete HTTP headers, effectively blocking the access to the dashboard.
CVE-2020-10274
- EPSS 0.28%
- Published 24.06.2020 05:15:13
- Last modified 21.11.2024 04:55:06
The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 ...
CVE-2020-10275
- EPSS 0.17%
- Published 24.06.2020 05:15:13
- Last modified 21.11.2024 04:55:07
The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthor...
CVE-2020-10276
- EPSS 0.36%
- Published 24.06.2020 05:15:13
- Last modified 21.11.2024 04:55:07
The password for the safety PLC is the default and thus easy to find (in manuals, etc.). This allows a manipulated program to be uploaded to the safety PLC, effectively disabling the emergency stop in case an object is too close to the robot. Navigat...
CVE-2020-10277
- EPSS 0.06%
- Published 24.06.2020 05:15:13
- Last modified 21.11.2024 04:55:07
There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually adding a new user with sudo privileges on the machine.