CVE-2020-10275

The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to compute the token and interact with the REST API to exfiltrate, infiltrate or delete data.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:mobile-industrial-robots:mir100_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:mobile-industrial-robots:mir100:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:mobile-industrial-robots:mir200_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mobile-industrial-robots:mir200:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:mobile-industrial-robots:mir250_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mobile-industrial-robots:mir250:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:mobile-industrial-robots:mir500_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mobile-industrial-robots:mir500:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:mobile-industrial-robots:mir1000_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:mobile-industrial-robots:mir1000:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:easyrobotics:er200_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:easyrobotics:er200:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:easyrobotics:er-lite_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:easyrobotics:er-lite:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:easyrobotics:er-flex_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:easyrobotics:er-flex:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:easyrobotics:er-one_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:easyrobotics:er-one:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:uvd-robots:uvd_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:uvd-robots:uvd:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:55

Type Values Removed Values Added
References () https://github.com/aliasrobotics/RVD/issues/2565 - Third Party Advisory () https://github.com/aliasrobotics/RVD/issues/2565 - Third Party Advisory

Information

Published : 2020-06-24 05:15

Updated : 2024-11-21 04:55


NVD link : CVE-2020-10275

Mitre link : CVE-2020-10275

CVE.ORG link : CVE-2020-10275


JSON object : View

Products Affected

easyrobotics

  • er-one_firmware
  • er-flex
  • er200_firmware
  • er200
  • er-lite_firmware
  • er-lite
  • er-one
  • er-flex_firmware

mobile-industrial-robots

  • mir1000_firmware
  • mir250_firmware
  • mir500_firmware
  • mir200
  • mir250
  • mir100_firmware
  • mir1000
  • mir100
  • mir500
  • mir200_firmware

uvd-robots

  • uvd_firmware
  • uvd
CWE
CWE-261

Weak Encoding for Password

CWE-326

Inadequate Encryption Strength