Lucene search

K

Uvd Firmware Security Vulnerabilities

cve
cve

CVE-2020-10274

The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 allows any attacker connected to the robot networ...

7.1CVSS

7AI Score

0.007EPSS

2020-06-24 05:15 AM
37
cve
cve

CVE-2020-10275

The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the defa...

9.8CVSS

9.2AI Score

0.002EPSS

2020-06-24 05:15 AM
35
cve
cve

CVE-2020-10276

The password for the safety PLC is the default and thus easy to find (in manuals, etc.). This allows a manipulated program to be uploaded to the safety PLC, effectively disabling the emergency stop in case an object is too close to the robot. Navigation and any other components dependent on the las...

9.8CVSS

9.5AI Score

0.002EPSS

2020-06-24 05:15 AM
38
cve
cve

CVE-2020-10277

There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually adding a new user with sudo privileges on the machine.

6.4CVSS

6.6AI Score

0.001EPSS

2020-06-24 05:15 AM
31
cve
cve

CVE-2020-10280

The Apache server on port 80 that host the web interface is vulnerable to a DoS by spamming incomplete HTTP headers, effectively blocking the access to the dashboard.

7.5CVSS

7.5AI Score

0.001EPSS

2020-06-24 06:15 AM
48