Vulnerability Details CVE-2020-10272
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the internal wireless and wired networks to take control of the robot seamlessly. In combination with CVE-2020-10269 and CVE-2020-10271, this flaw allows malicious actors to command the robot at desire.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.005
EPSS Ranking 63.8%
CVSS Severity
CVSS v3 Score 10.0
CVSS v2 Score 10.0
Products affected by CVE-2020-10272
-
cpe:2.3:h:aliasrobotics:mir1000:-
-
cpe:2.3:h:aliasrobotics:mir100:-
-
cpe:2.3:h:aliasrobotics:mir200:-
-
cpe:2.3:h:aliasrobotics:mir250:-
-
cpe:2.3:h:aliasrobotics:mir500:-
-
cpe:2.3:h:enabled-robotics:er-flex:-
-
cpe:2.3:h:enabled-robotics:er-lite:-
-
cpe:2.3:h:enabled-robotics:er-one:-
-
cpe:2.3:h:mobile-industrial-robotics:er200:-
-
cpe:2.3:h:uvd-robots:uvd_robots:-
-
cpe:2.3:o:aliasrobotics:mir1000_firmware:-
-
cpe:2.3:o:aliasrobotics:mir1000_firmware:2.8.1.1
-
cpe:2.3:o:aliasrobotics:mir100_firmware:-
-
cpe:2.3:o:aliasrobotics:mir100_firmware:2.8.1.1
-
cpe:2.3:o:aliasrobotics:mir200_firmware:-
-
cpe:2.3:o:aliasrobotics:mir200_firmware:2.8.1.1
-
cpe:2.3:o:aliasrobotics:mir250_firmware:-
-
cpe:2.3:o:aliasrobotics:mir250_firmware:2.8.1.1
-
cpe:2.3:o:aliasrobotics:mir500_firmware:-
-
cpe:2.3:o:aliasrobotics:mir500_firmware:2.8.1.1
-
cpe:2.3:o:enabled-robotics:er-flex_firmware:-
-
cpe:2.3:o:enabled-robotics:er-flex_firmware:2.8.1.1
-
cpe:2.3:o:enabled-robotics:er-lite_firmware:-
-
cpe:2.3:o:enabled-robotics:er-lite_firmware:2.8.1.1
-
cpe:2.3:o:enabled-robotics:er-one_firmware:-
-
cpe:2.3:o:enabled-robotics:er-one_firmware:2.8.1.1
-
cpe:2.3:o:mobile-industrial-robotics:er200_firmware:-
-
cpe:2.3:o:mobile-industrial-robotics:er200_firmware:2.8.1.1
-
cpe:2.3:o:uvd-robots:uvd_robots_firmware:-
-
cpe:2.3:o:uvd-robots:uvd_robots_firmware:2.8.1.1