Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-10271— RVD#2555: MiR ROS computational graph is exposed to all network interfaces, including poorly secured wireless networks and open wired ones

EPSS 0.40% · P61
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-10271

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
RVD#2555: MiR ROS computational graph is exposed to all network interfaces, including poorly secured wireless networks and open wired ones
Source: NVD (National Vulnerability Database)
Vulnerability Description
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph to all network interfaces, wireless and wired. This is the result of a bad set up and can be mitigated by appropriately configuring ROS and/or applying custom patches as appropriate. Currently, the ROS computational graph can be accessed fully from the wired exposed ports. In combination with other flaws such as CVE-2020-10269, the computation graph can also be fetched and interacted from wireless networks. This allows a malicious operator to take control of the ROS logic and correspondingly, the complete robot given that MiR's operations are centered around the framework (ROS).
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
将资源暴露给错误范围
Source: NVD (National Vulnerability Database)
Vulnerability Title
Mobile Industrial Robots MiR100 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Mobile Industrial Robots MiR100是MiR的一个应用软件。一款安全、经济高效的移动机器人,可快速实现内部运输和物流的自动化。 Mobile Industrial Robots MiR100存在安全漏洞。攻击者可利用该漏洞获取计算图表。以下产品及版本受到影响:使用2.8.1.1及之前版本固件的Alias Robotics MiR100;使用2.8.1.1及之前版本固件的Alias Robotics MiR200;使用2.8.1.1及之前版本固件的Alias Robotics Mi
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Mobile Industrial Robots A/SMiR100 v2.8.1.1 and before -

II. Public POCs for CVE-2020-10271

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-10271

登录查看更多情报信息。

Same Patch Batch · Mobile Industrial Robots A/S · 2020-06-24 · 12 CVEs total

CVE-2020-10269RVD#2566: Hardcoded Credentials on MiRX00 wireless Access Point
CVE-2020-10270RVD#2557: Hardcoded Credentials on MiRX00 Control Dashboard
CVE-2020-10272RVD#2554: MiR ROS computational graph presents no authentication mechanisms
CVE-2020-10273RVD#2560: Unprotected intellectual property in Mobile Industrial Robots (MiR) controllers
CVE-2020-10274RVD#2556: MiR REST API allows for data exfiltration by unauthorized attackers (e.g. indoor
CVE-2020-10275RVD#2565: Weak token generation for the REST API.
CVE-2020-10276RVD#2558: Default credentials on SICK PLC allows disabling safety features
CVE-2020-10277RVD#2562: Booting from a live image leads to exfiltration of sensible information and priv
CVE-2020-10278RVD#2561: Unprotected BIOS allows user to boot from live OS image.
CVE-2020-10279RVD#2569: Insecure operating system defaults in MiR robots
CVE-2020-10280RVD#2568: Apache server is vulnerable to a DoS

IV. Related Vulnerabilities

V. Comments for CVE-2020-10271

No comments yet


Leave a comment