Description
The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to compute the token and interact with the REST API to exfiltrate, infiltrate or delete data.
Published: 2020-06-24
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-2730 The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to compute the token and interact with the REST API to exfiltrate, infiltrate or delete data.
History

No history.

Subscriptions

Easyrobotics Er-flex Er-flex Firmware Er-lite Er-lite Firmware Er-one Er-one Firmware Er200 Er200 Firmware
Mobile-industrial-robots Mir100 Mir1000 Mir1000 Firmware Mir100 Firmware Mir200 Mir200 Firmware Mir250 Mir250 Firmware Mir500 Mir500 Firmware
Uvd-robots Uvd Uvd Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: Alias

Published:

Updated: 2024-09-16T20:31:47.182Z

Reserved: 2020-03-10T00:00:00.000Z

Link: CVE-2020-10275

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-06-24T05:15:13.193

Modified: 2024-11-21T04:55:07.113

Link: CVE-2020-10275

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses