{ "schema_version": "1.4.0", "id": "GHSA-w563-xmmw-pqwr", "modified": "2022-05-24T17:21:32Z", "published": "2022-05-24T17:21:32Z", "aliases": [ "CVE-2020-10271" ], "details": "MiR100, MiR200 and other MiR robots use the Robot Operating System (ROS) default packages exposing the computational graph to all network interfaces, wireless and wired. This is the result of a bad set up and can be mitigated by appropriately configuring ROS and/or applying custom patches as appropriate. Currently, the ROS computational graph can be accessed fully from the wired exposed ports. In combination with other flaws such as CVE-2020-10269, the computation graph can also be fetched and interacted from wireless networks. This allows a malicious operator to take control of the ROS logic and correspondingly, the complete robot given that MiR's operations are centered around the framework (ROS).", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10271" }, { "type": "WEB", "url": "https://github.com/aliasrobotics/RVD/issues/2555" } ], "database_specific": { "cwe_ids": [], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-06-24T05:15:00Z" } }