CVE-2020-10272
high-risk
Published 2020-06-24
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the internal wireless and wired networks to take control of the robot seamlessly. In combination with CVE-2020-10269 and CVE-2020-10271, this flaw allows malicious actors to command the robot at desire.
Do I need to act?
-
0.47% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (10)
Mir100 Firmware
Mir200 Firmware
Mir250 Firmware
Mir500 Firmware
Mir1000 Firmware
Er200 Firmware
Er-Lite Firmware
Er-Flex Firmware
Er-One Firmware
Uvd Robots Firmware
Affected Vendors
References (2)
50
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
2/34 · Minimal
Exposure
16/34 · Moderate