ID CVE-2020-10273
Summary MiR controllers across firmware versions 2.8.1.1 and before do not encrypt or protect in any way the intellectual property artifacts installed in the robots. This flaw allows attackers with access to the robot or the robot network (while in combination with other flaws) to retrieve and easily exfiltrate all installed intellectual property and data.
References
Vulnerable Configurations
  • cpe:2.3:o:aliasrobotics:mir100_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:aliasrobotics:mir100_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:aliasrobotics:mir100_firmware:2.8.1.1:*:*:*:*:*:*:*
    cpe:2.3:o:aliasrobotics:mir100_firmware:2.8.1.1:*:*:*:*:*:*:*
  • cpe:2.3:h:aliasrobotics:mir100:-:*:*:*:*:*:*:*
    cpe:2.3:h:aliasrobotics:mir100:-:*:*:*:*:*:*:*
  • cpe:2.3:o:aliasrobotics:mir200_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:aliasrobotics:mir200_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:aliasrobotics:mir200_firmware:2.8.1.1:*:*:*:*:*:*:*
    cpe:2.3:o:aliasrobotics:mir200_firmware:2.8.1.1:*:*:*:*:*:*:*
  • cpe:2.3:h:aliasrobotics:mir200:-:*:*:*:*:*:*:*
    cpe:2.3:h:aliasrobotics:mir200:-:*:*:*:*:*:*:*
  • cpe:2.3:o:aliasrobotics:mir250_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:aliasrobotics:mir250_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:aliasrobotics:mir250_firmware:2.8.1.1:*:*:*:*:*:*:*
    cpe:2.3:o:aliasrobotics:mir250_firmware:2.8.1.1:*:*:*:*:*:*:*
  • cpe:2.3:h:aliasrobotics:mir250:-:*:*:*:*:*:*:*
    cpe:2.3:h:aliasrobotics:mir250:-:*:*:*:*:*:*:*
  • cpe:2.3:o:aliasrobotics:mir500_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:aliasrobotics:mir500_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:aliasrobotics:mir500_firmware:2.8.1.1:*:*:*:*:*:*:*
    cpe:2.3:o:aliasrobotics:mir500_firmware:2.8.1.1:*:*:*:*:*:*:*
  • cpe:2.3:h:aliasrobotics:mir500:-:*:*:*:*:*:*:*
    cpe:2.3:h:aliasrobotics:mir500:-:*:*:*:*:*:*:*
  • cpe:2.3:o:aliasrobotics:mir1000_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:aliasrobotics:mir1000_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:aliasrobotics:mir1000_firmware:2.8.1.1:*:*:*:*:*:*:*
    cpe:2.3:o:aliasrobotics:mir1000_firmware:2.8.1.1:*:*:*:*:*:*:*
  • cpe:2.3:h:aliasrobotics:mir1000:-:*:*:*:*:*:*:*
    cpe:2.3:h:aliasrobotics:mir1000:-:*:*:*:*:*:*:*
  • cpe:2.3:o:mobile-industrial-robotics:er200_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:mobile-industrial-robotics:er200_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:mobile-industrial-robotics:er200_firmware:2.8.1.1:*:*:*:*:*:*:*
    cpe:2.3:o:mobile-industrial-robotics:er200_firmware:2.8.1.1:*:*:*:*:*:*:*
  • cpe:2.3:h:mobile-industrial-robotics:er200:-:*:*:*:*:*:*:*
    cpe:2.3:h:mobile-industrial-robotics:er200:-:*:*:*:*:*:*:*
  • cpe:2.3:o:enabled-robotics:er-lite_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:enabled-robotics:er-lite_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:enabled-robotics:er-lite_firmware:2.8.1.1:*:*:*:*:*:*:*
    cpe:2.3:o:enabled-robotics:er-lite_firmware:2.8.1.1:*:*:*:*:*:*:*
  • cpe:2.3:h:enabled-robotics:er-lite:-:*:*:*:*:*:*:*
    cpe:2.3:h:enabled-robotics:er-lite:-:*:*:*:*:*:*:*
  • cpe:2.3:o:enabled-robotics:er-flex_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:enabled-robotics:er-flex_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:enabled-robotics:er-flex_firmware:2.8.1.1:*:*:*:*:*:*:*
    cpe:2.3:o:enabled-robotics:er-flex_firmware:2.8.1.1:*:*:*:*:*:*:*
  • cpe:2.3:h:enabled-robotics:er-flex:-:*:*:*:*:*:*:*
    cpe:2.3:h:enabled-robotics:er-flex:-:*:*:*:*:*:*:*
  • cpe:2.3:o:enabled-robotics:er-one_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:enabled-robotics:er-one_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:enabled-robotics:er-one_firmware:2.8.1.1:*:*:*:*:*:*:*
    cpe:2.3:o:enabled-robotics:er-one_firmware:2.8.1.1:*:*:*:*:*:*:*
  • cpe:2.3:h:enabled-robotics:er-one:-:*:*:*:*:*:*:*
    cpe:2.3:h:enabled-robotics:er-one:-:*:*:*:*:*:*:*
  • cpe:2.3:o:uvd-robots:uvd_robots_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:uvd-robots:uvd_robots_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:o:uvd-robots:uvd_robots_firmware:2.8.1.1:*:*:*:*:*:*:*
    cpe:2.3:o:uvd-robots:uvd_robots_firmware:2.8.1.1:*:*:*:*:*:*:*
  • cpe:2.3:h:uvd-robots:uvd_robots:-:*:*:*:*:*:*:*
    cpe:2.3:h:uvd-robots:uvd_robots:-:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 21-12-2021 - 12:43)
Impact:
Exploitability:
CWE CWE-312
CAPEC
  • Retrieve Embedded Sensitive Data
    An attacker examines a target system to find sensitive data that has been embedded within it. This information can reveal confidential contents, such as account numbers or individual keys/credentials that can be used as an intermediate step in a larger attack.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
confirm https://github.com/aliasrobotics/RVD/issues/2560
Last major update 21-12-2021 - 12:43
Published 24-06-2020 - 05:15
Last modified 21-12-2021 - 12:43
Back to Top