CVE-2020-10264
Published Apr 6, 2020
Last updated 3 years ago
Overview
- Description
- CB3 SW Version 3.3 and upwards, e-series SW Version 5.0 and upwards allow authenticated access to the RTDE (Real-Time Data Exchange) interface on port 30004 which allows setting registers, the speed slider fraction as well as digital and analog Outputs. Additionally unautheticated reading of robot data is also possible
- Source
- cve@aliasrobotics.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5.8
- Impact score
- 6.4
- Exploitability score
- 6.5
- Vector string
- AV:A/AC:L/Au:N/C:P/I:P/A:P
Vendor comments
- Universal RobotsSoftware version 5.10 brings improvements to usability and configurability of Secure Shell Protocol (SSH), such that tunneling can be used to secure primary, secondary, RT, RTDE, DashBoard server and other interfaces. Universal Robots recommends that all users use SSH tunneling to access these interfaces in applications requiring authentication and encryption. Additionally, SW version 5.10 includes a built-in configurable firewall, allowing fine-grained restrictions of remote access, and number of other security improvements. Universal Robots (UR) recommends always using the latest UR software, as security improvements will be rolled out continuously. CB2 and CB3 cobots are designed to be operating in factory networks where security relies on boundary protection (firewalls) and trusted clients on the network. They must only be connected to trusted networks and operated by authorized personnel.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:universal-robots:ur_software:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0DBD9531-40D3-4B4B-A90A-23538C4CACAA", "versionEndIncluding": "3.3.3.292", "versionStartIncluding": "3.0.14989" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:universal-robots:ur10:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "07EAD156-50AB-4402-A42B-3E536AE99C32" }, { "criteria": "cpe:2.3:h:universal-robots:ur3:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FEBB3217-A74E-4EF2-BD4B-3964E57BC759" }, { "criteria": "cpe:2.3:h:universal-robots:ur5:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "304BF507-9AE5-4A15-B037-32115093C73C" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:universal-robots:ur_software:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ACDE81CE-8BB3-4764-BC90-4A0E81F08479", "versionStartIncluding": "5.0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:universal-robots:ur10e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2BD1EE16-7833-4B3F-93BA-B1E83EAED4BA" }, { "criteria": "cpe:2.3:h:universal-robots:ur3e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "142B520E-BB5E-4677-9D59-08064EFD2EAC" }, { "criteria": "cpe:2.3:h:universal-robots:ur5e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3B066243-52D3-4A2A-B62F-C5E9CF74DFB1" } ], "operator": "OR" } ], "operator": "AND" } ]