MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph without any sort of authentication. This allows attackers with access to the internal wireless and wired networks to take control of the robot seamlessly. In combination with CVE-2020-10269 and CVE-2020-10271, this flaw allows malicious actors to command the robot at desire.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/aliasrobotics/RVD/issues/2554 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: Alias
Published:
Updated: 2024-09-17T01:32:00.119Z
Reserved: 2020-03-10T00:00:00
Link: CVE-2020-10272

No data.

Status : Modified
Published: 2020-06-24T05:15:12.943
Modified: 2024-11-21T04:55:06.683
Link: CVE-2020-10272

No data.