← Volver a CVEs
CVE-2020-10275
CRITICAL9.8
Descripcion
The access tokens for the REST API are directly derived from the publicly available default credentials for the web interface. Given a USERNAME and a PASSWORD, the token string is generated directly with base64(USERNAME:sha256(PASSWORD)). An unauthorized attacker inside the network can use the default credentials to compute the token and interact with the REST API to exfiltrate, infiltrate or delete data.
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado6/24/2020
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
easyrobotics:er-flexeasyrobotics:er-flex_firmwareeasyrobotics:er-liteeasyrobotics:er-lite_firmwareeasyrobotics:er-oneeasyrobotics:er-one_firmwareeasyrobotics:er200easyrobotics:er200_firmwaremobile-industrial-robots:mir100mobile-industrial-robots:mir1000mobile-industrial-robots:mir1000_firmwaremobile-industrial-robots:mir100_firmwaremobile-industrial-robots:mir200mobile-industrial-robots:mir200_firmwaremobile-industrial-robots:mir250mobile-industrial-robots:mir250_firmwaremobile-industrial-robots:mir500mobile-industrial-robots:mir500_firmwareuvd-robots:uvduvd-robots:uvd_firmware
Debilidades (CWE)
CWE-261CWE-326
Referencias
https://github.com/aliasrobotics/RVD/issues/2565(cve@aliasrobotics.com)
https://github.com/aliasrobotics/RVD/issues/2565(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.