CVE-2020-10275
moderate-risk
Published 2020-06-24
The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to compute the token and interact with the REST API to exfiltrate, infiltrate or delete data.
Do I need to act?
-
0.17% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (10)
Mir100 Firmware
Mir200 Firmware
Mir250 Firmware
Mir500 Firmware
Mir1000 Firmware
Er200 Firmware
Er-Lite Firmware
Er-Flex Firmware
Er-One Firmware
Uvd Firmware
Affected Vendors
References (2)
Third Party Advisory
https://github.com/aliasrobotics/RVD/issues/2565
Third Party Advisory
https://github.com/aliasrobotics/RVD/issues/2565
49
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
1/34 · Minimal
Exposure
16/34 · Moderate