TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2020-10269

CRITICAL
9.8

Beschreibung

One of the wireless interfaces within MiR100, MiR200 and possibly (according to the vendor) other MiR fleet vehicles comes pre-configured in WiFi Master (Access Point) mode. Credentials to such wireless Access Point default to well known and widely spread SSID (MiR_RXXXX) and passwords (omitted). This information is also available in past User Guides and manuals which the vendor distributed. We have confirmed this flaw in MiR100 and MiR200 but it might also apply to MiR250, MiR500 and MiR1000.

CVE Details

CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht6/24/2020
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

aliasrobotics:mir100aliasrobotics:mir1000aliasrobotics:mir1000_firmwarealiasrobotics:mir100_firmwarealiasrobotics:mir200aliasrobotics:mir200_firmwarealiasrobotics:mir250aliasrobotics:mir250_firmwarealiasrobotics:mir500aliasrobotics:mir500_firmwareenabled-robotics:er-flexenabled-robotics:er-flex_firmwareenabled-robotics:er-liteenabled-robotics:er-lite_firmwareenabled-robotics:er-oneenabled-robotics:er-one_firmwaremobile-industrial-robotics:er200mobile-industrial-robotics:er200_firmwareuvd-robots:uvd_robotsuvd-robots:uvd_robots_firmware

Schwachen (CWE)

CWE-798CWE-798

Referenzen

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.