Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-45h2-9ghc-w5ff

Опубликовано: 22 окт. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 8.7
CVSS3: 4.6

Описание

Ghost Robotics Vision 60 v0.27.2 includes, among its physical interfaces, three RJ45 connectors and a USB Type-C port. The vulnerability is due to the lack of authentication mechanisms when establishing connections through these ports. Specifically, with regard to network connectivity, the robot's internal router automatically assigns IP addresses to any device physically connected to it. An attacker could connect a WiFi access point under their control to gain access to the robot's network without needing the credentials for the deployed network. Once inside, the attacker can monitor all its data, as the robot runs on ROS 2 without authentication by default.

Ghost Robotics Vision 60 v0.27.2 includes, among its physical interfaces, three RJ45 connectors and a USB Type-C port. The vulnerability is due to the lack of authentication mechanisms when establishing connections through these ports. Specifically, with regard to network connectivity, the robot's internal router automatically assigns IP addresses to any device physically connected to it. An attacker could connect a WiFi access point under their control to gain access to the robot's network without needing the credentials for the deployed network. Once inside, the attacker can monitor all its data, as the robot runs on ROS 2 without authentication by default.

EPSS

Процентиль: 9%
0.00032
Низкий

8.7 High

CVSS4

4.6 Medium

CVSS3

Дефекты

CWE-798

Связанные уязвимости

CVSS3: 4.6
nvd
4 месяца назад

Ghost Robotics Vision 60 v0.27.2 includes, among its physical interfaces, three RJ45 connectors and a USB Type-C port. The vulnerability is due to the lack of authentication mechanisms when establishing connections through these ports. Specifically, with regard to network connectivity, the robot's internal router automatically assigns IP addresses to any device physically connected to it. An attacker could connect a WiFi access point under their control to gain access to the robot's network without needing the credentials for the deployed network. Once inside, the attacker can monitor all its data, as the robot runs on ROS 2 without authentication by default.

EPSS

Процентиль: 9%
0.00032
Низкий

8.7 High

CVSS4

4.6 Medium

CVSS3

Дефекты

CWE-798