Vulnerabilities > UVD Robots > Medium

DATE CVE VULNERABILITY TITLE RISK
2020-06-24 CVE-2020-10280 Improper Resource Shutdown or Release vulnerability in multiple products
The Apache server on port 80 that host the web interface is vulnerable to a DoS by spamming incomplete HTTP headers, effectively blocking the access to the dashboard.
5.0
2020-06-24 CVE-2020-10278 Improper Authentication vulnerability in multiple products
The BIOS onboard MiR's Computer is not protected by password, therefore, it allows a Bad Operator to modify settings such as boot order.
5.0
2020-06-24 CVE-2020-10277 There is no mechanism in place to prevent a bad operator to boot from a live OS image, this can lead to extraction of sensible files (such as the shadow file) or privilege escalation by manually adding a new user with sudo privileges on the machine. 4.6
2020-06-24 CVE-2020-10274 Use of Insufficiently Random Values vulnerability in multiple products
The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws).
5.5
2020-06-24 CVE-2020-10273 Cleartext Storage of Sensitive Information vulnerability in multiple products
MiR controllers across firmware versions 2.8.1.1 and before do not encrypt or protect in any way the intellectual property artifacts installed in the robots.
5.0
2020-06-24 CVE-2020-10271 Exposure of Resource to Wrong Sphere vulnerability in multiple products
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph to all network interfaces, wireless and wired.
5.0
2020-06-24 CVE-2020-10270 Use of Hard-coded Credentials vulnerability in multiple products
Out of the wired and wireless interfaces within MiR100, MiR200 and other vehicles from the MiR fleet, it's possible to access the Control Dashboard on a hardcoded IP address.
5.0
2020-06-24 CVE-2020-10269 Use of Hard-coded Credentials vulnerability in multiple products
One of the wireless interfaces within MiR100, MiR200 and possibly (according to the vendor) other MiR fleet vehicles comes pre-configured in WiFi Master (Access Point) mode.
5.0