The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 allows any attacker connected to the robot networks (wired or wireless) to exfiltrate all stored data (e.g. indoor mapping images) and associated metadata from the robot's database.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-2729 | The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 allows any attacker connected to the robot networks (wired or wireless) to exfiltrate all stored data (e.g. indoor mapping images) and associated metadata from the robot's database. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/aliasrobotics/RVD/issues/2556 |
|
History
No history.
Status: PUBLISHED
Assigner: Alias
Published:
Updated: 2024-09-17T00:05:33.397Z
Reserved: 2020-03-10T00:00:00
Link: CVE-2020-10274
No data.
Status : Modified
Published: 2020-06-24T05:15:13.113
Modified: 2024-11-21T04:55:06.977
Link: CVE-2020-10274
No data.
OpenCVE Enrichment
No data.
EUVD