Lucene search

K
AliasroboticsMir100 Firmware

7 matches found

CVE
CVE
added 2020/06/24 5:15 a.m.69 views

CVE-2020-10273

MiR controllers across firmware versions 2.8.1.1 and before do not encrypt or protect in any way the intellectual property artifacts installed in the robots. This flaw allows attackers with access to the robot or the robot network (while in combination with other flaws) to retrieve and easily exfil...

7.5CVSS7AI score0.00124EPSS
CVE
CVE
added 2020/06/24 5:15 a.m.65 views

CVE-2020-10269

One of the wireless interfaces within MiR100, MiR200 and possibly (according to the vendor) other MiR fleet vehicles comes pre-configured in WiFi Master (Access Point) mode. Credentials to such wireless Access Point default to well known and widely spread SSID (MiR_RXXXX) and passwords (omitted). T...

9.8CVSS9.3AI score0.00305EPSS
CVE
CVE
added 2020/06/24 6:15 a.m.59 views

CVE-2020-10279

MiR robot controllers (central computation unit) makes use of Ubuntu 16.04.2 an operating system, Thought for desktop uses, this operating system presents insecure defaults for robots. These insecurities include a way for users to escalate their access beyond what they were granted via file creatio...

10CVSS9.6AI score0.00287EPSS
CVE
CVE
added 2020/06/24 5:15 a.m.58 views

CVE-2020-10271

MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph to all network interfaces, wireless and wired. This is the result of a bad set up and can be mitigated by appropriately configuring ROS and/or applying custom patches as approp...

10CVSS9.5AI score0.00441EPSS
CVE
CVE
added 2020/06/24 5:15 a.m.53 views

CVE-2020-10272

MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the internal wireless and wired networks to take control of the robot seamlessly. In combination with C...

10CVSS9.6AI score0.00473EPSS
CVE
CVE
added 2020/06/24 5:15 a.m.50 views

CVE-2020-10278

The BIOS onboard MiR's Computer is not protected by password, therefore, it allows a Bad Operator to modify settings such as boot order. This can be leveraged by a Malicious operator to boot from a Live Image.

6.1CVSS5.3AI score0.00223EPSS
CVE
CVE
added 2020/06/24 5:15 a.m.48 views

CVE-2020-10270

Out of the wired and wireless interfaces within MiR100, MiR200 and other vehicles from the MiR fleet, it's possible to access the Control Dashboard on a hardcoded IP address. Credentials to such wireless interface default to well known and widely spread users (omitted) and passwords (omitted). This...

9.8CVSS7.2AI score0.00466EPSS