CVE-2020-10274 - MiR REST API allows for data exfiltration by unauthorized attackers (e.g. indoor maps)

by vmayoral
macOS ◆ xterm-256color ◆ zsh 1014 views

The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 allows any attacker connected to the robot networks (wired or wireless) to exfiltrate all stored data (e.g. indoor mapping images) and associated metadata from the robot’s database.

Demonstrated using https://aliasrobotics.com/alurity.php.