aliasrobotics mir100_firmware 将资源暴露给错误范围
CVE编号
CVE-2020-10271利用情况
暂无补丁情况
N/A披露时间
2020-06-24漏洞描述
MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph to all network interfaces, wireless and wired. This is the result of a bad set up and can be mitigated by appropriately configuring ROS and/or applying custom patches as appropriate. Currently, the ROS computational graph can be accessed fully from the wired exposed ports. In combination with other flaws such as CVE-2020-10269, the computation graph can also be fetched and interacted from wireless networks. This allows a malicious operator to take control of the ROS logic and correspondingly, the complete robot given that MiR's operations are centered around the framework (ROS).解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://github.com/aliasrobotics/RVD/issues/2555 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | aliasrobotics | mir1000_firmware | * | Up to (including) 2.8.1.1 | |||||
运行在以下环境 | |||||||||
系统 | aliasrobotics | mir100_firmware | * | Up to (including) 2.8.1.1 | |||||
运行在以下环境 | |||||||||
系统 | aliasrobotics | mir200_firmware | * | Up to (including) 2.8.1.1 | |||||
运行在以下环境 | |||||||||
系统 | aliasrobotics | mir250_firmware | * | Up to (including) 2.8.1.1 | |||||
运行在以下环境 | |||||||||
系统 | aliasrobotics | mir500_firmware | * | Up to (including) 2.8.1.1 | |||||
运行在以下环境 | |||||||||
系统 | enabled-robotics | er-flex_firmware | * | Up to (including) 2.8.1.1 | |||||
运行在以下环境 | |||||||||
系统 | enabled-robotics | er-lite_firmware | * | Up to (including) 2.8.1.1 | |||||
运行在以下环境 | |||||||||
系统 | enabled-robotics | er-one_firmware | * | Up to (including) 2.8.1.1 | |||||
运行在以下环境 | |||||||||
系统 | mobile-industrial-robotics | er200_firmware | * | Up to (including) 2.8.1.1 | |||||
运行在以下环境 | |||||||||
系统 | uvd-robots | uvd_robots_firmware | * | Up to (including) 2.8.1.1 | |||||
运行在以下环境 | |||||||||
硬件 | aliasrobotics | mir100 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | aliasrobotics | mir1000 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | aliasrobotics | mir200 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | aliasrobotics | mir250 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | aliasrobotics | mir500 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | enabled-robotics | er-flex | - | - | |||||
运行在以下环境 | |||||||||
硬件 | enabled-robotics | er-lite | - | - | |||||
运行在以下环境 | |||||||||
硬件 | enabled-robotics | er-one | - | - | |||||
运行在以下环境 | |||||||||
硬件 | mobile-industrial-robotics | er200 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | uvd-robots | uvd_robots | - | - | |||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
CWE-ID | 漏洞类型 |
CWE-668 | 将资源暴露给错误范围 |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论