Description
The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 allows any attacker connected to the robot networks (wired or wireless) to exfiltrate all stored data (e.g. indoor mapping images) and associated metadata from the robot's database.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-2729 | The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 allows any attacker connected to the robot networks (wired or wireless) to exfiltrate all stored data (e.g. indoor mapping images) and associated metadata from the robot's database. |
References
| Link | Providers |
|---|---|
| https://github.com/aliasrobotics/RVD/issues/2556 |
|
History
No history.
Subscriptions
Easyrobotics
Subscribe
Er-flex
Subscribe
Er-flex Firmware
Subscribe
Er-lite
Subscribe
Er-lite Firmware
Subscribe
Er-one
Subscribe
Er-one Firmware
Subscribe
Er200
Subscribe
Er200 Firmware
Subscribe
Mobile-industrial-robots
Subscribe
Mir100
Subscribe
Mir1000
Subscribe
Mir1000 Firmware
Subscribe
Mir100 Firmware
Subscribe
Mir200
Subscribe
Mir200 Firmware
Subscribe
Mir250
Subscribe
Mir250 Firmware
Subscribe
Mir500
Subscribe
Mir500 Firmware
Subscribe
Uvd-robots
Subscribe
Uvd
Subscribe
Uvd Firmware
Subscribe
Status: PUBLISHED
Assigner: Alias
Published:
Updated: 2024-09-17T00:05:33.397Z
Reserved: 2020-03-10T00:00:00.000Z
Link: CVE-2020-10274
No data.
Status : Modified
Published: 2020-06-24T05:15:13.113
Modified: 2024-11-21T04:55:06.977
Link: CVE-2020-10274
No data.
OpenCVE Enrichment
No data.
EUVD