Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8839-62pg-36q3

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 allows any attacker connected to the robot networks (wired or wireless) to exfiltrate all stored data (e.g. indoor mapping images) and associated metadata from the robot's database.

The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 allows any attacker connected to the robot networks (wired or wireless) to exfiltrate all stored data (e.g. indoor mapping images) and associated metadata from the robot's database.

EPSS

Процентиль: 51%
0.00279
Низкий

Дефекты

CWE-330

Связанные уязвимости

CVSS3: 7.1
nvd
больше 5 лет назад

The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 allows any attacker connected to the robot networks (wired or wireless) to exfiltrate all stored data (e.g. indoor mapping images) and associated metadata from the robot's database.

EPSS

Процентиль: 51%
0.00279
Низкий

Дефекты

CWE-330