Description
The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to compute the token and interact with the REST API to exfiltrate, infiltrate or delete data.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-2730 | The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to compute the token and interact with the REST API to exfiltrate, infiltrate or delete data. |
References
| Link | Providers |
|---|---|
| https://github.com/aliasrobotics/RVD/issues/2565 |
|
History
No history.
Subscriptions
Easyrobotics
Subscribe
Er-flex
Subscribe
Er-flex Firmware
Subscribe
Er-lite
Subscribe
Er-lite Firmware
Subscribe
Er-one
Subscribe
Er-one Firmware
Subscribe
Er200
Subscribe
Er200 Firmware
Subscribe
Mobile-industrial-robots
Subscribe
Mir100
Subscribe
Mir1000
Subscribe
Mir1000 Firmware
Subscribe
Mir100 Firmware
Subscribe
Mir200
Subscribe
Mir200 Firmware
Subscribe
Mir250
Subscribe
Mir250 Firmware
Subscribe
Mir500
Subscribe
Mir500 Firmware
Subscribe
Uvd-robots
Subscribe
Uvd
Subscribe
Uvd Firmware
Subscribe
Status: PUBLISHED
Assigner: Alias
Published:
Updated: 2024-09-16T20:31:47.182Z
Reserved: 2020-03-10T00:00:00.000Z
Link: CVE-2020-10275
No data.
Status : Modified
Published: 2020-06-24T05:15:13.193
Modified: 2024-11-21T04:55:07.113
Link: CVE-2020-10275
No data.
OpenCVE Enrichment
No data.
EUVD