CVE-2020-10276
moderate-risk
Published 2020-06-24
The password for the safety PLC is the default and thus easy to find (in manuals, etc.). This allows a manipulated program to be uploaded to the safety PLC, effectively disabling the emergency stop in case an object is too close to the robot. Navigation and any other components dependent on the laser scanner are not affected (thus it is hard to detect before something happens) though the laser scanner configuration can also be affected altering further the safety of the device.
Do I need to act?
-
0.36% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (10)
Mir100 Firmware
Mir200 Firmware
Mir250 Firmware
Mir500 Firmware
Mir1000 Firmware
Er200 Firmware
Er-Lite Firmware
Er-Flex Firmware
Er-One Firmware
Uvd Firmware
Affected Vendors
References (2)
Third Party Advisory
https://github.com/aliasrobotics/RVD/issues/2558
Third Party Advisory
https://github.com/aliasrobotics/RVD/issues/2558
49
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
1/34 · Minimal
Exposure
16/34 · Moderate