{"containers":{"cna":{"affected":[{"product":"Universal Robots Robot Controllers CB 2, CB3, e-series","vendor":"Universal Robots","versions":[{"status":"affected","version":"unspecified"}]}],"credits":[{"lang":"en","value":"Bernhard Dieber, Benjamin Breiling (and many others)"}],"datePublic":"2020-04-04T00:00:00.000Z","descriptions":[{"lang":"en","value":"Universal Robots Robot Controllers Version CB2 SW Version 1.4 upwards, CB3 SW Version 3.0 and upwards, e-series SW Version 5.0 and upwards expose a service called DashBoard server at port 29999 that allows for control over core robot functions like starting/stopping programs, shutdown, reset safety and more. The DashBoard server is not protected by any kind of authentication or authorization."}],"metrics":[{"cvssV3_0":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.4,"baseSeverity":"CRITICAL","confidentialityImpact":"LOW","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H","version":"3.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-306","description":"CWE-306 (Missing Authentication for Critical Function)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2020-04-06T12:08:40.000Z","orgId":"dc524f69-879d-41dc-ab8f-724e78658a1a","shortName":"Alias"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://www.universal-robots.com/how-tos-and-faqs/how-to/ur-how-tos/real-time-data-exchange-rtde-guide/"}],"source":{"defect":["RVD#1443"],"discovery":"EXTERNAL"},"title":"RVD#1443: UR dashboard server enables unauthenticated remote control of core robot functions","x_generator":{"engine":"Robot Vulnerability Database (RVD)"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@aliasrobotics.com","DATE_PUBLIC":"2020-04-04T15:38:55 +00:00","ID":"CVE-2020-10265","STATE":"PUBLIC","TITLE":"RVD#1443: UR dashboard server enables unauthenticated remote control of core robot functions"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Universal Robots Robot Controllers CB 2, CB3, e-series","version":{"version_data":[{"version_value":""}]}}]},"vendor_name":"Universal Robots"}]}},"credit":[{"lang":"eng","value":"Bernhard Dieber, Benjamin Breiling (and many others)"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Universal Robots Robot Controllers Version CB2 SW Version 1.4 upwards, CB3 SW Version 3.0 and upwards, e-series SW Version 5.0 and upwards expose a service called DashBoard server at port 29999 that allows for control over core robot functions like starting/stopping programs, shutdown, reset safety and more. The DashBoard server is not protected by any kind of authentication or authorization."}]},"generator":{"engine":"Robot Vulnerability Database (RVD)"},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.4,"baseSeverity":"critical","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-306 (Missing Authentication for Critical Function)"}]}]},"references":{"reference_data":[{"name":"https://www.universal-robots.com/how-tos-and-faqs/how-to/ur-how-tos/real-time-data-exchange-rtde-guide/","refsource":"CONFIRM","url":"https://www.universal-robots.com/how-tos-and-faqs/how-to/ur-how-tos/real-time-data-exchange-rtde-guide/"}]},"source":{"defect":["RVD#1443"],"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T10:58:39.935Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.universal-robots.com/how-tos-and-faqs/how-to/ur-how-tos/real-time-data-exchange-rtde-guide/"}]}]},"cveMetadata":{"assignerOrgId":"dc524f69-879d-41dc-ab8f-724e78658a1a","assignerShortName":"Alias","cveId":"CVE-2020-10265","datePublished":"2020-04-06T12:08:40.665Z","dateReserved":"2020-03-10T00:00:00.000Z","dateUpdated":"2024-09-17T03:07:51.861Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}