TROYANOSYVIRUS
Back to CVEs

CVE-2026-1442

HIGH
7.8

Description

Since the encryption algorithm used to protect firmware updates is itself encrypted using key material available to an attacker (or anyone paying attention), the firmware updates may be altered by an unauthorized user, and then trusted by a Unitree product, such as the Unitree Go2 and other models. This issue appears to affect all of Unitree’s current offerings as of February 26, 2026, and so should be considered a vulnerability in both the firmware generation and extraction processes. At the time of this release, there is no publicly-documented mechanism to subvert the update process and insert poisoned firmware packages without the equipment owner’s knowledge.

CVE Details

CVSS v3.1 Score7.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredNONE
User InteractionREQUIRED
Published2/27/2026
Last Modified3/11/2026
Sourcenvd
Honeypot Sightings0

Affected Products

unitree:go1_airunitree:go1_air_firmwareunitree:go1_prounitree:go1_pro_firmwareunitree:go2_airunitree:go2_air_firmwareunitree:go2_edu_plusunitree:go2_edu_plus_firmwareunitree:go2_edu_standardunitree:go2_edu_standard_firmwareunitree:go2_prounitree:go2_pro_firmwareunitree:go2_xunitree:go2_x_firmware

Weaknesses (CWE)

CWE-321

IOC Correlations

No correlations recorded

This product uses data from the NVD API but is not endorsed or certified by the NVD.