Coder Social home page Coder Social logo

aliasrobotics / rvd Goto Github PK

View Code? Open in Web Editor NEW
167.0 11.0 31.0 1.47 MB

Robot Vulnerability Database. An archive of robot vulnerabilities and bugs.

Home Page: https://aliasrobotics.com

License: GNU General Public License v3.0

Python 99.75% Dockerfile 0.25%
bug bounty security robotics robot cybersecurity hacking vulnerability flaw ros ros2 robots vulns-ros2 robot-vulnerabilities px4 drones

rvd's Introduction

Robot Vulnerability Database (RVD)

Article

This repository contains the Robot Vulnerability and Database (RVD), an attempt to register and record robot vulnerabilities and bugs.

Vulnerabilities are rated according to the Robot Vulnerability Scoring System (RVSS). For a discussion regarding terminology and the difference between robot vulnerabilities, robot weaknesses, robot bugs or others refer to Appendix A.

Cite this work (BibTeX)
@article{vilches2019introducing,
  title={Introducing the robot vulnerability database (rvd)},
  author={Vilches, V{'\i}ctor Mayoral and Juan, Lander Usategui San and Dieber, Bernhard and Carbajo, Unai Ayucar and Gil-Uriarte, Endika},
  journal={arXiv preprint arXiv:1912.11299},
  year={2019}
}

As main contributor, Alias Robotics supports and offers robot cybersecurity activities in close collaboration with original robot manufacturers. By no means Alias encourages or promote the unauthorized tampering with running robotic systems. This can cause serious human harm and material damages.

Last updated Sat, 25 Feb 2023 10:07:12 GMT

Open Closed All
Vulnerabilities label: vulns_open label: vulns_closed label: vulns
Bugs label: bugs_open label: bugs_closed label: bugs
Others label: others_open label: others_closed label: others
Vulnerabilities (open) label: vulns_critical label: vulns_high label: vulns_medium label: vulns_low
Robot vulnerabilities by robot component

By robot components, we consider both software and hardware robot components

Robot vulnerabilities by robot
Robot vulnerabilities by vendor

For more, visit the complete list of reported robot vulnerabilities.

ToC

Concepts

Each RVD issue (ticket) corresponds with a flaw that is labeled appropriately. The meaning of the most relevant labels or statuses is covered below. Refer to the appendices for definitions on the terminology used:

  • : Flaw that remains active or under research.
  • : Flaw that is inactive. Reasons for inactivity relate to mitigations, duplicates, erroneous reports or similar.
  • : Ticket discarded and removed for the overall count. This label flags invalid or failed reports including tests and related.
  • : Duplicated flaw. Might go in combination with invalid but if not, typically, a link to the original ticket is provided.
  • : Flaw has a malformed syntax. Refer to the templates for basic guidelines on the right syntax.
  • : Mitigated. A link to the corresponding mitigation is required.
  • : Indicates that the bug is a quality one instead of a security flaw.
  • : Indicates that flaw is an exposure.
  • : Indicates that flaw is a bug, a security bug can potentially lead to a vulnerability (Note that this last part corresponds with the definition of a weakness, a bug that may have security implications. However, in an attempt to simplify and for coherence with other databases, bug and weakness terms are used interchangeably).
  • : Indicates that flaw is a vulnerability.

For more including the categorization used for flaws refer to RVD's taxonomy

Sponsored and funded projects

ROS

Last updated Sat, 25 Feb 2023 10:07:12 GMT

Open Closed All
ROS Vulnerabilities label: vulns_open_ros label: vulns_closed_ros label: vulns_ros
ROS Bugs label: bugs_open_ros label: bugs_closed_ros label: bugs_ros
ROS Others label: others_open_ros label: others_closed_ros label: others_ros
Severity of ROS Vulnerabilities (open and if available) label: vulns_critical_ros label: vulns_high_ros label: vulns_medium_ros label: vulns_low_ros

ROS 2

Last updated Sat, 25 Feb 2023 10:07:12 GMT

Open Closed All
ROS 2 Vulnerabilities label: vulns_open_ros2 label: vulns_closed_ros2 label: vulns_ros2
ROS 2 Bugs label: bugs_open_ros2 label: bugs_closed_ros2 label: bugs_ros2
ROS 2 Others label: others_open_ros2 label: others_closed_ros2 label: others_ros2
Severity of ROS 2 Vulnerabilities (open and if available) label: vulns_critical_ros2 label: vulns_high_ros2 label: vulns_medium_ros2 label: vulns_low_ros2

Disclosure policy

Together with RVD, we propose a coherent diclosure policy adopted first by Alias Robotics. Thee disclosure policy is highly inspired by Google's Project Zero. TL;DR, unless otherwise specified, we adhere to a 90-day disclosure deadline for new vulnerabilities.

This policy is strongly in line with our desire to improve the robotics industry response times to security bugs, but also results in softer landings for bugs marginally over deadline. According to our research, most vendors are ignoring security flaws completely. We call on all researchers to adopt disclosure deadlines in some form, and feel free to use our policy verbatim (we've actually done so, from Google's) if you find our record and reasoning compelling. Creating pressure towards more reasonably-timed fixes will result in smaller windows of opportunity for blackhats to abuse vulnerabilities. Given the direct physical connection with the world that robots have, in our opinion, vulnerability disclosure policies such as ours result in greater security in robotics and an overall improved safety. A security-first approach is a must to ensure safe robotic operations.

The maintainers of RVD believe that vulnerability disclosure is a two-way street where both vendors and researchers, must act responsibly. We generally adhere to a 90-day disclosure deadline for new vulnerabilities while other flaws such as simple bugs or bugs could be filed at any point in time (refer to Appendix A for the difference between vulnerabilities, bugs and bugs). We notify vendors of vulnerabilities immediately, with details shared in public with the defensive community after 90 days, or sooner if the vendor releases a fix.

Similar to Google's policy, we want to acknowledge that the deadline can vary in the following ways:

  • If a deadline is due to expire on a weekend or public holiday, the deadline will be moved to the next normal work day.

  • Before the 90-day deadline has expired, if a vendor lets us know that a patch is scheduled for release on a specific day that will fall within 14 days following the deadline, we will delay the public disclosure until the availability of the patch.

  • When we observe a previously unknown and unpatched vulnerability in software under active exploitation (a “0day”), we believe that more urgent action—within 7 days—is appropriate. The reason for this special designation is that each day an actively exploited vulnerability remains undisclosed to the public and unpatched, more devices or accounts will be compromised. Seven days is an aggressive timeline and may be too short for some vendors to update their products, but it should be enough time to publish advice about possible mitigations, such as temporarily disabling a service, restricting access, or contacting the vendor for more information. As a result, after 7 days have elapsed without a patch or advisory, we will support researchers making details available so that users can take steps to protect themselves.

Each security researcher or group should reserve the right to bring deadlines forwards or backwards based on extreme circumstances. We remain committed to treating all vendors strictly equally and we expect to be held to the same standard.

CI/CD setup

In an attempt to lower the overall effort to maintain the Robot Vulnerability Database, RVD attempts to make active use of Continuous Integration (CI) and Continuous Deployment (CD) techniques through Github Actions. See our configurations here. Contributions and new ideas to this section are welcome. Please submit a Pull Request with your proposal or enhancement.

Below we list some of the existing capabilities (some deprecated in the current setup) and some tentative ones for future versions:

Beta (>= 0.5)

  • Comparison of stack trace before flaw submission to avoid duplicates (perfomed upstream) [deprecated, modern versions of the database include more information of relevance than solely the stack trace on each ticket]
  • Markdown parser that conforms with RVD templates [deprecated, moved to YAML format]
  • Automatic flaw-syntax evaluation (based on parser), tags tickets as malformed when applicable [deprecated, syntax changed]
  • Automatic feedback on flaw-syntax, introduced in tickets directly as a comment [deprecated, syntax changed]

1.x (>= 1.0)

  • Discussion on a more formal taxonomy to apply when categorizing flaws (see docs/TAXONOMY.md)
  • Definition of a formal schema for RVD coherent to the taxonomy and inspired by prior work
  • Automatic re-generation of README.md as summary
  • Development of CLI toolset to manage RVD
  • Include ID in the title of the ticket as "RVD#ID: ..."
  • Automatic review of database in-search for duplicates
  • Automatic review of database in-search for malformed tickets, tag them appropriately
    • Automatic feedback on malformations
    • Notify when ticket is malformed and skip it (instead of throwing an error as of now)
    • Consider restrictions on title ("RVD#ID: ...")
  • Unify YAML dumps in tickets (e.g. stick to yaml.dump(yaml_document))
  • Extend TAXONOMY and language to include 'exploitation-recipe'
  • Extend TAXONOMY and language to include product and versions, to simplify CVE submission
  • Match both Github labels and YAML fields for selected topics:
    • Vendor/manufacturer
    • Products affected
  • Use local cache of tickets for all verbs, instead of polling from database every time
  • Develop capabilities to output CVE JSON-compatible tickets
  • Security action: Add a first-step towards a security pipeline that performs static analysis on source code

Future

  • Security action: Unit, functional and integration tests
  • Security action: other (TODO: dep. tracking, dynamic analysis)
  • Make a table with versions per product and automatically-mitigate (and close) flaws in older versions that haven't been (auto)detected in newer versions.
  • Automatic and periodic review of security advisories "in search" for robot-related vulnerabilities
  • Automatic and periodic review of NVD "in search" for robot-related vulnerabilities
  • Automatic and periodic review of CVE List "in search" for robot-related vulnerabilities
  • CWE ID parser and validation method to conform with official CWE guidelines
  • Automatic CWE ID validation mechanism (and feedback) in all tickets. Upgrade flaw-syntax evaluation.
  • RVSS parser and validation to conform with RVSSv1.0 spec.
  • Define some temporal limits for tickets, if it remains without updates longer than the limit, close automatically
    • Consider closed issues when checking for duplicates and if collisions appear, re-open and indicate so
  • Automatic RVSS validation mechanism (and feedback) in all tickets. Upgrade flaw-syntax evaluation.
  • schema
    • enforce subsystem policy
    • enforce id policy
    • architectural-location get consistency between platform code and platform-code. Same for application-specific. Also, remove ROS-specific.
    • specificity, enfoce policy and allowed keywords

Contributing, reporting a vulnerability

Vulnerabilities are community-contributed. If you believe you have discovered a vulnerability in a robot or robot component (either software or hardware), obtain public acknowledgement by submitting a vulnerability while providing prove of it. Reports can be submitted in the form of an issue.

If you wish to contribute to the RVD repository's content, please note that this document (README.md) is generated automatically. Submit the corresponding PRs by looking at the rvd_tools/ folder. If you need some inspiration or ideas to contribute, refer to CI/CD setup.

Contact us or send feedback

Feel free to contact us if you have any requests of feedaback at contact[at]aliasrobotics[dot]com

Automatic pings for manufacturers

By default, new vulnerabilities are reported to manufacturers and/or open source projects however other flaws aren't. Alias Robotics can inform manufacturers directly when bugs are reported. If you're interested in this service, contact contact[at]aliasrobotics[dot]com.

Cite our work

@article{vilches2019introducing,
  title={Introducing the robot vulnerability database (rvd)},
  author={Mayoral-Vilches, V{'\i}ctor and Juan, Lander Usategui San and Dieber, Bernhard and Carbajo, Unai Ayucar and Gil-Uriarte, Endika},
  journal={arXiv preprint arXiv:1912.11299},
  year={2019}
}

Appendices

Appendix A: Vulnerabilities, weaknesses, bugs and more

Research on terminology

Commonly:

  • A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways.

According to CWE:

  • software weaknesses are errors (bugs) that can lead to software vulnerabilities.
  • software vulnerability is a mistake in software that can be directly used by a hacker to gain access to a system or network.

Moreover, according to CVE page:

  • A vulnerability is a bug in the computational logic (e.g., code) found in software and some hardware components (e.g., firmware) that, when exploited, results in a negative impact to confidentiality, integrity or availability (more here).
  • An exposure is a system configuration issue or a mistake in software that allows access to information or capabilities that can be used by a hacker as a stepping-stone into a system or network.

ISO/IEC 27001 defines only vulnerability:

  • (robot) vulnerability: bug of an asset or control that can be exploited by one or more threats

Discussion and interpretation

From the definitions above, it seems reasonable to associate use interchangeably bugs and flaws when referring to software issues. In addition, the word weakness seems applicable to any flaw that might turn into a vulnerability however it must be noted that (from the text above) a vulnerability "must be exploited"). Based on this a clear difference can be established classifiying flaws with no potential to be exploitable as bugs and flaws potentially exploitable as vulnerabilities. Ortogonal to this appear exposures which refer to misconfigurations that allows attackers to establish an attack vector in a system.

Beyond pure logic, an additional piece of information that comes out of researching other security databases is that most security-oriented databases do not distinguish between bugs (general bugs) and weaknesses (security bugs).

Based in all of the above, we interpret and make the following assumptions for RVD:

  • unless specified, all flaws are "security flaws" (an alternative could be a quality flaw)
  • flaw, bug and weakness refer to the same thing and can be used interchangeably
  • a bug is a flaw with potential to be exploited (but unconfirmed exploitability) unless specified with the quality label in which case, refers to a general non security-related bug.
  • vulnerability is a bug that is exploitable.
  • exposure is a configuration error or mistake in software that without leading to exploitation, leaks relevant information that empowers an attacker.

Appendix B: How does RVD relate to CVE, the CVE List and the NVD?

Some definitions:

  • Robot Vulnerability Database (RVD) is a database for robot vulnerabilities and bugs that aims to record and categorize flaws that apply to robot and robot components. RVD was created as a community-contributed and open archive of robot security flaws. It was originally created and sponsored by Alias Robotics.
  • Common Vulnerabilities and Exposures (CVE) List CVE® is an archive (dictionary according to the official source) of entries—each containing an identification number, a description, and at least one public reference—for publicly known cybersecurity vulnerabilities. CVE contains vulnerabilities and exposures and is sponsored by the U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA). It is not a database (see official information). CVE List feeds vulnerability databases (such as the National Vulnerability Database (NVD)) with its entries and also acts as an aggregator of vulnerabilities and exposures reported at NVD.
  • U.S. National Vulnerability Database (NVD) is the U.S. government repository of standards based vulnerability management data. It presents an archive with vulnerabilities, each with their corresponding CVE identifiers. NVD gets fed by the CVE List and then builds upon the information included in CVE Entries to provide enhanced information for each entry such as fix information, severity scores, and impact ratings.

RVD does not aim to replace CVE but to complement it for the domain of robotics. RVD aims to become CVE-compatible (see official guidelines for compatibility) by tackling aspects such scope and impact of the flaws (through a proper severity scoring mechanism for robots), information for facilitating mitigation, detailed technical information, etc. For a more detailed discussion, see this ROS Discourse thread.

When compared to other vulnerability databases, RVD aims to differenciate itself by focusing on the following:

  • robot specific: RVD aims to focus and capture robot-specific flaws. If a flaw does not end-up applying to a robot or a robot component then it should not be recorded here.
  • community-oriented: while RVD is originally sponsored by Alias Robotics, it aims to become community-managed and contributed.
  • facilitates reproducing robot flaws: Working with robots is very time consuming. Mitigating a vulnerability or a bug requires one to first reproduce the flaw. This can be extremely time consuming. Not so much providing the fix itself but ensuring that your environment is appropriate. At RVD, each flaw entry should aim to include a field named as reproduction-image. This should correspond with the link to a Docker image that should allow anyone reproduce the flaw easily.
  • robot-specific severity scoring: opposed to CVSS which has strong limitations when applied to robotics, RVD uses RVSS, a robot-specific scoring mechanism.

As part of RVD, we encourage security researchers to file CVE Entries and use official CVE identifiers for their reports and discussions at RVD.

Appendix C: Legal disclaimer

ACCESS TO THIS DATABASE (OR PORTIONS THEREOF) AND THE USE OF INFORMATION, MATERIALS, PRODUCTS OR SERVICES PROVIDED THROUGH THIS WEB SITE (OR PORTIONS THEREOF), IS NOT INTENDED, AND IS PROHIBITED, WHERE SUCH ACCESS OR USE VIOLATES APPLICABLE LAWS OR REGULATIONS.

By using or accessing this database you warrant to Alias Robotics S.L. that you will not use this Web site for any purpose that is unlawful or that is prohibited. This product is provided with "no warranties, either express or implied." The information contained is provided "as-is", with "no guarantee of merchantability. In no event will Alias Robotics S.L. be liable for any incidental, indirect, consequential, punitive or special damages of any kind, or any other damages whatsoever, including, without limitation, those resulting from loss of profit, loss of contracts, loss of reputation, goodwill, data, information, income, anticipated savings or business relationships, whether or not Alias Robotics S.L. has been advised of the possibility of such damage, arising out of or in connection with the use of this database or any linked websites."

These Terms of Use are made under Spanish law and this database is operated from Vitoria-Gasteiz, Spain. Access to, or use of, this database site or information, materials, products and/or services on this site may be prohibited by law in certain countries or jurisdictions. You are responsible for compliance with any applicable laws of the country from which you are accessing this site. We make no representation that the information contained herein is appropriate or available for use in any location.

You agree that the courts of Vitoria-Gasteiz, Spain shall have exclusive jurisdiction to resolve any controversy or claim of whatever nature arising out of or relating to use of this site. However, we retain the right to bring legal proceedings in any jurisdiction where we believe that infringement of this agreement is taking place or originating.


rosin_logo

Supported by ROSIN - ROS-Industrial Quality-Assured Robot Software Components. More information: rosin-project.eu

eu_flag

This repository was partly funded by ROSIN RedROS2-I FTP which received funding from the European Union’s Horizon 2020 research and innovation programme under the project ROSIN with the grant agreement No 732287.

rvd's People

Contributors

dependabot[bot] avatar landeru avatar roizpi avatar rvd-bot avatar unaithetutamatumatu avatar vmayoral avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

rvd's Issues

Hacker Amateur

Input Value
Robot Component ROS2
Vendor N/A
CVE ID N/A
CWE ID Cross-Site Request Forgery (CSRF) (CWE-352)
RVSS Score 4.4
RVSS Vector RVSS:1.0/AV:PI/AC:H/PR:H/UI:R/Y:T/S:U/C:H/I:L/A:N/H:N
GitHub Account dmayoralv
Date Reported 2018-08-08
Date Updated N/A
Exploitation vector EVERYWHERE

Description:

Today is the DOOM DAY

RVD#6: UR3, UR5, UR10 Stack-based buffer overflow

{
    "id": 6,
    "title": "RVD#6: UR3, UR5, UR10 Stack-based buffer overflow",
    "type": "vulnerability",
    "description": " An stack-based buffer overflow in Universal Robots Modbus TCP service could allow remote attackers to execute arbitrary code and alter protected settings via specially crafted packets.On version 3.1-3.3.4-310 Credits to: Cesar Cerrudo and Lucas Apa from IOActive",
    "cwe": "CWE-Stack Overflow (CWE-121)",
    "cve": "None",
    "keywords": [
        "malformed",
        "robot",
        "robot: UR3",
        "severity: critical",
        "vendor: Universal Robots",
        "vulnerability"
    ],
    "system": "UR3, UR5, UR10",
    "vendor": "Universal Robots",
    "severity": {
        "rvss-score": "10.0",
        "rvss-vector": "RVSS:1.0/AV:RN/AC:L/PR:N/UI:N/Y:T/S:C/C:H/I:H/A:H/H:H",
        "severity-description": "critical",
        "cvss-score": 10.0,
        "cvss-vector": "CVSS:3.0/AV:RN/AC:L/PR:N/UI:N/Y:T/S:C/C:H/I:H/A:H"
    },
    "links": [
        "https://ioactive.com/pdfs/Hacking-Robots-Before-Skynet-Technical-Appendix.pdf",
        "https://ioactive.com/exploiting-industrial-collaborative-robots/",
        "https://github.com/aliasrobotics/RVD/issues/6",
        "https://2017.zeronights.org/wp-content/uploads/materials/ZN17_Lucas_Robots.pdf"
    ],
    "flaw": {
        "phase": "testing",
        "specificity": "subject-specific",
        "architectural-location": "application-specific code",
        "application": "manipulation",
        "subsystem": "actuation:manipulator",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-03-01",
        "detected-by": "Lucas Apa (IOActive)",
        "detected-by-method": "testing violation",
        "date-reported": "2017-03-01",
        "reported-by": "Lucas Apa (IOActive)",
        "reported-by-relationship": "security researcher",
        "issue": "https://github.com/aliasrobotics/RVD/issues/6",
        "reproducibility": "always",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

RVD#14: Insecure transport in SoftBank's Pepper and NAO robot's Qi Protocol

{
    "id": 14,
    "title": "RVD#14: Insecure transport in SoftBank's Pepper and NAO robot's Qi Protocol",
    "type": "vulnerability",
    "description": "Insecure transport in SoftBank's Pepper and NAO robot's Qi Protocol could allow man-in-the-middle attackers to eavesdrop sensitive information or affect integrity of sent data.On all versions.",
    "cwe": "CWE-319",
    "cve": "N/A",
    "keywords": [
        "robot: NAO",
        "robot: Pepper",
        "severity: critical",
        "vendor: SoftBank Robotics",
    ],
    "system": "NAO / Pepper",
    "vendor": "SoftBank Robotics",
    "severity": {
        "rvss-score": "7.5",
        "rvss-vector": "RVSS:1.0/AV:IN/AC:L/PR:N/UI:N/Y:M/S:U/C:H/I:L/A:L/H:U",
        "severity-description": "High",
        "cvss-score": "8.6",
        "cvss-vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L/"
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/14"
    ],
    "flaw": {
        "phase": "testing",
        "specificity": "general-issue",
        "architectural-location": "platform code",
        "application": "NaoQi",
        "subsystem": "HTTP communication layer",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-03-01",
        "detected-by": "Cesar Cerrudo and Lucas Apa from IOActive",
        "detected-by-method": "Testing dynamic",
        "date-reported": "2017-03-01",
        "reported-by": "Alias Robotics",
        "reported-by-relationship": "Security researcher",
        "issue": "https://github.com/aliasrobotics/RVD/issues/14",
        "reproducibility": "Always",
        "trace": "N/A",
        "reproduction": "N/A",
        "reproduction-image": "N/A"
    },
    "exploitation": {
        "description": "N/A",
        "exploitation-image": "N/A",
        "exploitation-vector": "N/A"
    },
    "mitigation": {
        "description": "N/A",
        "pull-request": "N/A",
        "date-mitigation": null
    }
}

RVD#9: Improper authorization mechanism in SoftBank's Pepper and NAO robots

{
    "id": 9,
    "title": "RVD#9: Improper authorization mechanism in SoftBank's Pepper and NAO robots ",
    "type": "vulnerability",
    "description": " Improper authorization mechanism in SoftBank's Pepper and NAO robots could allow remote attackers to gain unrestricted access to robot configuration and sensor data via an unsecured object proxy mechanism. Credits to: Cesar Cerrudo and Lucas Apa from IOActive",
    "cwe": "CWE-285",
    "cve": "None",
    "keywords": [
        "robot: NAO",
        "robot: Pepper",
        "vendor: SoftBank Robotics",
        "vulnerability"
    ],
    "system": "NAO / Pepper NAOqi",
    "vendor": "SoftBank Robotics",
    "severity": {
        "rvss-score": 8.2,
        "rvss-vector": "RVSS:1.0/AV:IN/AC:L/PR:N/UI:N/Y:M/S:U/C:H/I:H/A:L/H:U",
        "severity-description": "High",
        "cvss-score": 9.4,
        "cvss-vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L"
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/14"
    ],
    "flaw": {
        "phase": "testing",
        "specificity": "general-issue",
        "architectural-location": "platform code",
        "application": "NaoQi",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-03-01",
        "detected-by": "Cesar Cerrudo and Lucas Apa from IOActive",
        "detected-by-method": "Testing dynamic",
        "date-reported": "2017-03-01",
        "reported-by": "Alias Robotics",
        "reported-by-relationship": "Security researcher",
        "issue": "https://github.com/aliasrobotics/RVD/issues/14",
        "reproducibility": "Always",
        "trace": "N/A",
        "reproduction": "N/A",
        "reproduction-image": "N/A"
    },
    "exploitation": {
        "description": "N/A",
        "exploitation-image": "N/A",
        "exploitation-vector": "N/A"
    },
    "mitigation": {
        "description": "N/A",
        "pull-request": "N/A",
        "date-mitigation": "N/A",
    }
}

RVD#11: Improper authorization mechanism in Rethink Robotics's Baxter SDK/RSDK

{
    "id": 11,
    "title": "RVD#11: Improper authorization mechanism in Rethink Robotics's Baxter SDK/RSDK ",
    "type": "vulnerability",
    "description": " Insecure transport in Rethink Robotics's Baxter & Sawyer Task Editor could allow man-in-the-middle attackers to eavesdrop sensitive or security critical communications or affect integrity of sent data.On versions: Baxter/Sawyer v3.3.2 Credits to: Cesar Cerrudo and Lucas Apa from IOActive",
    "cwe": "CWE-Improper Authorization (CWE-285)",
    "cve": "None",
    "keywords": [
        "robot",
        "robot: Baxter",
        "robot: Sawyer",
        "severity: critical",
        "state: new",
        "vendor: Rethink Robotics",
        "vulnerability"
    ],
    "system": "Baxter, Sawyer SDK/Intera SDK",
    "vendor": "Rethink Robotics",
    "severity": {
        "rvss-score": "None",
        "rvss-vector": "RVSS:1.0/AV:RN/AC:L/PR:N/UI:N/Y:T/S:U/C:H/I:H/A:L/H:N",
        "severity-description": "",
        "cvss-score": 0,
        "cvss-vector": ""
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/11"
    ],
    "flaw": {
        "phase": "unknown",
        "specificity": "N/A",
        "architectural-location": "N/A",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-03-01",
        "detected-by": "",
        "detected-by-method": "N/A",
        "date-reported": "2017-03-01",
        "reported-by": "",
        "reported-by-relationship": "N/A",
        "issue": "https://github.com/aliasrobotics/RVD/issues/11",
        "reproducibility": "",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

test

Input Value
Robot Others
Vendor N/A
CVE ID N/A
CWE ID Business Logic Errors (CWE-840)
RVSS Score 5.9
RVSS Vector RVSS:1.0/AV:PI/AC:L/PR:L/UI:R/Y:T/S:U/C:H/I:N/A:H/H:U
GitHub Account LanderU
Date Reported 2018-08-08
Date Updated N/A
Exploitation vector Test

Description:

Outside test

RVD#37: Insecure Storage Exposing

{
    "id": 37,
    "title": "RVD#37: Insecure Storage Exposing",
    "type": "vulnerability",
    "description": "Exposing unencrypted storage cards such as SD Cards could allow attackers to change robot actions or any other downloadable content that is stored on this card.The android application from UBTech Alpha 2 does not remove the QR code generated from the SDCard once generated during the first robot pairing. This code contains the WiFi password that is configured on the robot.The SD card contains the pairing QR code with the robot's Wi-Fi password in plaintext. Credits to: Cesar Cerrudo and Lucas Apa from IOActive",
    "cwe": "CWE-Plaintext Storage of a Password (CWE-256)",
    "cve": "None",
    "keywords": [
        "malformed",
        "robot",
        "robot: Alpha 2",
        "severity: high",
        "state: new",
        "vendor: UBTech Robotics",
        "vulnerability"
    ],
    "system": "Alpha 2",
    "vendor": "UBTech Robotics",
    "severity": {
        "rvss-score": "None",
        "rvss-vector": "RVSS:1.0/AV:PP/AC:L/PR:N/UI:R/Y:T/S:C/C:L/I:L/A:N/H:H",
        "severity-description": "",
        "cvss-score": 0,
        "cvss-vector": ""
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/37"
    ],
    "flaw": {
        "phase": "unknown",
        "specificity": "N/A",
        "architectural-location": "N/A",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-03-01",
        "detected-by": "",
        "detected-by-method": "N/A",
        "date-reported": "2017-03-01",
        "reported-by": "",
        "reported-by-relationship": "N/A",
        "issue": "https://github.com/aliasrobotics/RVD/issues/37",
        "reproducibility": "",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

Demo

Input Value
Robot UR3
Vendor Universal Robots
CVE ID N/A
CWE ID Cross-Site Request Forgery (CSRF) (CWE-352)
RVSS Score 7.3
RVSS Vector RVSS:1.0/AV:PR/AC:L/PR:N/UI:R/Y:Z/S:U/C:H/I:H/A:H/H:U
GitHub Account Hsha
Date Reported 2018-08-08
Date Updated N/A
Exploitation vector Hshaha

Description:

hscagahscagahscagahscagahscagahscagahscagahscaga

RVD#42: Poor software protection

{
    "id": 42,
    "title": "RVD#42: Poor software protection",
    "type": "vulnerability",
    "description": "On previous firmware versions of ABB's Service BoxOn top of easily accessible firmware images, researchers found that custom binaries (e.g., the embedded web server) built by some vendors include all debug information (i.e., unstripped). Generally, all but one vendor\u2019s firmware images were easy to open with Binwalk\u2019s default settings. Credits to Federico Maggi, Trend Micro Forward-Looking Threat Research, Davide Quarta, Marcello Pogliani, Mario Polino, Andrea M. Zanchettin, and Stefano Zanero, Politecnico di Milano",
    "cwe": "CWE-Information Exposure Through Debug Information (CWE-215)",
    "cve": "None",
    "keywords": [
        "malformed",
        "robot",
        "robot component: ABB's Service Box",
        "severity: high",
        "state: new",
        "vendor: ABB",
        "vulnerability"
    ],
    "system": "ABB's Service Box",
    "vendor": "ABB",
    "severity": {
        "rvss-score": "None",
        "rvss-vector": "RVSS:1.0/AV:RN/AC:L/PR:N/UI:N/Y:T/S:U/C:H/I:N/A:N/H:N",
        "severity-description": "",
        "cvss-score": 0,
        "cvss-vector": ""
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/42"
    ],
    "flaw": {
        "phase": "unknown",
        "specificity": "N/A",
        "architectural-location": "N/A",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-05-03",
        "detected-by": "",
        "detected-by-method": "N/A",
        "date-reported": "2017-05-03",
        "reported-by": "",
        "reported-by-relationship": "N/A",
        "issue": "https://github.com/aliasrobotics/RVD/issues/42",
        "reproducibility": "",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

RVD#1: VGo Robot vulnerability: OS Command Injection

{
    "id": 1,
    "title": "RVD#1: VGo Robot vulnerability: OS Command Injection",
    "type": "vulnerability",
    "description": "An attacker on an adjacent network could perform command injectionOn versions prior to VGo Robot 3.0.3.52164 are vulnerable: 3.0.3, 3.0.2, 2.1.0, 2.0.0, 1.5.5, 1.5.0, 1.4.2\r\n Credits to: Daniel Regalado from Zingbox reported this vulnerability to NCCIC.\r\n ",
    "cwe": "CWE-OS Command Injection (CWE-78)",
    "cve": "None",
    "keywords": [
        "malformed",
        "robot",
        "robot: Vgo",
        "severity: critical",
        "state: new",
        "vendor: Vecna",
        "vulnerability"
    ],
    "system": "VGo Robot",
    "vendor": "Vecna",
    "severity": {
        "rvss-score": "None",
        "rvss-vector": "RVSS:1.0/AV:AN/AC:L/PR:N/UI:N/Y:O/S:U/C:H/I:H/A:H/H:H",
        "severity-description": "",
        "cvss-score": 0,
        "cvss-vector": ""
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/1"
    ],
    "flaw": {
        "phase": "unknown",
        "specificity": "N/A",
        "architectural-location": "N/A",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2018-04-25 12:28:51",
        "detected-by": "",
        "detected-by-method": "N/A",
        "date-reported": "2018-04-25 12:28:51",
        "reported-by": "",
        "reported-by-relationship": "N/A",
        "issue": "https://github.com/aliasrobotics/RVD/issues/1",
        "reproducibility": "",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

RVD#7: Missing authorization mechanisms in V-Sido OS

{
    "id": 7,
    "title": "RVD#7: Missing authorization mechanisms in V-Sido OS",
    "type": "vulnerability",
    "description": "Missing authorization mechanisms in Asratec's V-Sido OS could allow remote attackers to unauthorizedly control the robot.\r\n Credits to: Cesar Cerrudo and Lucas Apa from IOActive",
    "cwe": "CWE-CWE-862: Missing Authorization",
    "cve": "None",
    "keywords": [
        "components software",
        "robot component: V-Sido OS",
        "severity: critical",
        "state: new",
        "vulnerability"
    ],
    "system": "V-Sido OS",
    "vendor": "Asratec",
    "severity": {
        "rvss-score": "None",
        "rvss-vector": "RVSS:1.0/AV:RN/AC:L/PR:N/UI:N/Y:T/S:U/C:N/I:H/A:H/H:H",
        "severity-description": "",
        "cvss-score": 0,
        "cvss-vector": ""
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/7"
    ],
    "flaw": {
        "phase": "unknown",
        "specificity": "N/A",
        "architectural-location": "N/A",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-03-01",
        "detected-by": "",
        "detected-by-method": "N/A",
        "date-reported": "2017-03-01",
        "reported-by": "",
        "reported-by-relationship": "N/A",
        "issue": "https://github.com/aliasrobotics/RVD/issues/7",
        "reproducibility": "",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

Demo

Input Value
Robot Baxter
Vendor Rethink Robotics
CVE ID N/A
CWE ID Client-Side Enforcement of Server-Side Security (CWE-602)
RVSS Score 3.5
RVSS Vector RVSS:1.0/AV:PI/AC:H/PR:H/UI:R/Y:U/S:U/C:L/I:L/A:L/H:N
GitHub Account Unaiayu
Date Reported 2018-08-24
Date Updated N/A
Exploitation vector Local network

Description:

Tryal from Firefox

dsadas

Input Value
Robot Sawyer
Vendor Rethink Robotics
CVE ID N/A
CWE ID Password in Configuration File/s (CWE-260)
RVSS Score 6.5
RVSS Vector RVSS:1.0/AV:PR/AC:L/PR:L/UI:R/Y:T/S:U/C:H/I:N/A:H/H:U
GitHub Account dsdsa
Date Reported 2018-08-08
Date Updated N/A
Exploitation vector dsadafa

Description:

fdsfdsfs

RVD#15: Insecure transport in Universal Robots's robot-to-robot communications

{
    "id": 15,
    "title": "RVD#15: Insecure transport in Universal Robots's robot-to-robot communications ",
    "type": "vulnerability",
    "description": "Insecure transport in Universal Robots's robot-to-robot communications could allow man-in-the-middle attackers to eavesdrop sensitive information or affect integrity of sent data.On versions: Alpha2Services--0520-english-1.1.0.1.jar, Alpha2Services.jar Credits to: Cesar Cerrudo and Lucas Apa from IOActive",
    "cwe": "CWE-Cleartext Transmission of Sensitive Information (CWE-319)",
    "cve": "None",
    "keywords": [
        "malformed",
        "robot",
        "robot: UR10",
        "robot: UR3",
        "robot: UR5",
        "severity: critical",
        "state: new",
        "vendor: Universal Robots",
        "vulnerability"
    ],
    "system": "UR3, UR5, UR10",
    "vendor": "Universal Robots",
    "severity": {
        "rvss-score": 10.0,
        "rvss-vector": "RVSS:1.0/AV:RN/AC:H/PR:N/UI:N/Y:T/S:U/C:H/I:H/A:L/H:H",
        "severity-description": "critical",
        "cvss-score": 0,
        "cvss-vector": ""
    },
    "links": [
        "https://ioactive.com/pdfs/Hacking-Robots-Before-Skynet-Technical-Appendix.pdf",
        "https://ioactive.com/exploiting-industrial-collaborative-robots/",
        "https://github.com/aliasrobotics/RVD/issues/15"
    ],
    "flaw": {
        "phase": "testing",
        "specificity": "subject-specific",
        "architectural-location": "application-specific code",
        "application": "manipulation",
        "subsystem": "actuation:manipulator",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-03-01",
        "detected-by": "Lucas Apa (IOActive)",
        "detected-by-method": "testing violation",
        "date-reported": "2017-03-01",
        "reported-by": "Lucas Apa (IOActive)",
        "reported-by-relationship": "security researcher",
        "issue": "https://github.com/aliasrobotics/RVD/issues/6",
        "reproducibility": "always",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

Demo

Input Value
Robot Pepper
Vendor Softbank Robotics
CVE ID N/A
CWE ID Cross-site Scripting (XSS) - Generic (CWE-79)
RVSS Score 0.0
RVSS Vector RVSS:1.0/AV:PI/AC:L/PR:N/UI:R/Y:Z/S:U/C:N/I:N/A:N/H:U
GitHub Account LanderU
Date Reported 2018-07-07
Date Updated N/A
Exploitation vector Test test

Description:

testtesttesr

RVD#39: Remote Firmware Upgrade in Alpha 1S As

{
    "id": 39,
    "title": "RVD#39: Remote Firmware Upgrade in Alpha 1S As",
    "type": "vulnerability",
    "description": "It is possible to remotely upgrade the Alpha 1S firmware by sending an undocumented command through Bluetooth. Furthermore, binaries from UBTech are not cryptographically signed, in consequence, they could be replaced by malicious files that change the normal behaviour of the robots.\r\nThe following code from the EngineUpdateManager function on the Alpha 1S Android App downloads and installs an update file on the remote robot without checking the update's cryptographic integrity and authenticityIt is possible to upgrade its firmware by sending a special Bluetooth command and new firmware data. Credits to: Cesar Cerrudo and Lucas Apa from IOActive",
    "cwe": "CWE-Download of Code Without Integrity Check (CWE-494)",
    "cve": "None",
    "keywords": [
        "malformed",
        "robot",
        "robot: Alpha 1S",
        "severity: critical",
        "state: new",
        "vendor: UBTech Robotics",
        "vulnerability"
    ],
    "system": "Alpha 1S",
    "vendor": "UBTech Robotics",
    "severity": {
        "rvss-score": "None",
        "rvss-vector": "RVSS:1.0/AV:L/AC:L/PR:N/UI:N/Y:T/S:C/C:H/I:H/A:N/H:H",
        "severity-description": "",
        "cvss-score": 0,
        "cvss-vector": ""
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/39"
    ],
    "flaw": {
        "phase": "unknown",
        "specificity": "N/A",
        "architectural-location": "N/A",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-03-01",
        "detected-by": "",
        "detected-by-method": "N/A",
        "date-reported": "2017-03-01",
        "reported-by": "",
        "reported-by-relationship": "N/A",
        "issue": "https://github.com/aliasrobotics/RVD/issues/39",
        "reproducibility": "",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

dafd

Input Value
Robot Pepper
Vendor Softbank Robotics
CVE ID N/A
CWE ID Array Index Underflow (CWE-129)
RVSS Score 5.7
RVSS Vector RVSS:1.0/AV:PR/AC:L/PR:L/UI:R/Y:Z/S:U/C:L/I:L/A:H/H:U
GitHub Account aliasbot
Date Reported 2017-03-01
Date Updated 2017-03-01
Exploitation vector dfsda

Description:

dafgdfdaf

RVD#44: Weak authentication on robot's main computer

{
    "id": 44,
    "title": "RVD#44: Weak authentication on robot's main computer",
    "type": "vulnerability",
    "description": "Researchers discovered that an attacker can bypass the User Authentication System (UAS) because of several implementation flaws: \r\n1) disabled authentication during system boot\r\n2) use of a default user name (without a password) that cannot be changed or removed\r\n3) the use of a specific user that comes with a set of unchangeable hardcoded credentialsIt is possible to violate a robot\u2019s integrity through the control-loop alteration and calibration parameters tampering approaches described earlier. We wanted to overshoot the joints in order to collapse the robot on itself and force the servo motors beyond their physical, structural limits. Note that this attack is costly and potentially destructive because its goal is to damage the robot.Alternatively, an attacker could use the robot state alteration approach to repeatedly and abruptly start and stop a servo motor, causing electromechanical components, the brakes, and the servo motor to wear.  Acknowledgement: Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, Andrea M. Zanchettin, Stefano Zanero",
    "cwe": "CWE-Improper Authentication - Generic (CWE-287)",
    "cve": "None",
    "keywords": [
        "components hardware",
        "malformed",
        "robot component: IRB140's main computer",
        "severity: high",
        "state: new",
        "vendor: ABB",
        "vulnerability"
    ],
    "system": "IRB140's main computer",
    "vendor": "ABB",
    "severity": {
        "rvss-score": "None",
        "rvss-vector": "RVSS:1.0/AV:RN/AC:L/PR:H/UI:N/Y:T/S:U/C:N/I:H/A:L/H:H",
        "severity-description": "",
        "cvss-score": 0,
        "cvss-vector": ""
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/44"
    ],
    "flaw": {
        "phase": "unknown",
        "specificity": "N/A",
        "architectural-location": "N/A",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-05-03",
        "detected-by": "",
        "detected-by-method": "N/A",
        "date-reported": "2017-05-03",
        "reported-by": "",
        "reported-by-relationship": "N/A",
        "issue": "https://github.com/aliasrobotics/RVD/issues/44",
        "reproducibility": "",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

RVD#4: ROS vulnerability affecting Raven 2 robot

{
    "id": 4,
    "title": "RVD#4: ROS vulnerability affecting Raven 2 robot",
    "type": "vulnerability",
    "description": " Improper message verification in Applied Dexterity's Raven 2 could allow man-in-the-middle attackers to modify and send arbitrary commands by spoofing network traffic. Credits to: Tamara Bonaci, Jeffrey Herron, Tariq Yusuf, Junjie Yan, Tadayoshi Kohno, Howard Jay Chizeck from the University of Washington.",
    "cwe": "CWE-Improper Enforcement of Message Integrity During Transmission in a Communication Channel (CWE-924)",
    "cve": "None",
    "keywords": [
        "components software",
        "robot component: ROS",
        "severity: critical",
        "vulnerability"
    ],
    "system": "ROS",
    "vendor": "Applied Dexterity",
    "severity": {
        "rvss-score": 10.0,
        "rvss-vector": "RVSS:1.0/AV:RN/AC:L/PR:N/UI:N/Y:Z/S:U/C:L/I:H/A:H/H:H",
        "severity-description": "critical",
        "cvss-score": 9.4,
        "cvss-vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H"
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/4"
    ],
    "flaw": {
        "phase": "unknown",
        "specificity": "N/A",
        "architectural-location": "N/A",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2015-05-13",
        "detected-by": "",
        "detected-by-method": "N/A",
        "date-reported": "2015-05-13",
        "reported-by": "",
        "reported-by-relationship": "N/A",
        "issue": "https://github.com/aliasrobotics/RVD/issues/4",
        "reproducibility": "",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": ""
    }
}

RVD#38: App-to-Server Missing Encryption

{
    "id": 38,
    "title": "RVD#38: App-to-Server Missing Encryption",
    "type": "vulnerability",
    "description": "The Alpha 1S android application does not verify any cryptographic signature when downloading and installing the APK update into the mobile device. Furthermore, due to \"App-to-Server Missing Encryption\" it is possible to perform a man-in-the-middle attack in order to change the APK URL and install a customized malware on the device. Credits to: Cesar Cerrudo and Lucas Apa from IOActive",
    "cwe": "CWE-Missing Encryption of Sensitive Data (CWE-311)",
    "cve": "None",
    "keywords": [
        "components hardware",
        "robot component: Alpha 1S android application",
        "severity: high",
        "state: new",
        "vendor: UBTech Robotics",
        "vulnerability"
    ],
    "system": "Alpha 1S android application",
    "vendor": "UBTech Robotics",
    "severity": {
        "rvss-score": "None",
        "rvss-vector": "RVSS:1.0/AV:L/AC:L/PR:N/UI:R/Y:T/S:C/C:H/I:H/A:N/H:H",
        "severity-description": "",
        "cvss-score": 0,
        "cvss-vector": ""
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/38"
    ],
    "flaw": {
        "phase": "unknown",
        "specificity": "N/A",
        "architectural-location": "N/A",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-03-01",
        "detected-by": "",
        "detected-by-method": "N/A",
        "date-reported": "2017-03-01",
        "reported-by": "",
        "reported-by-relationship": "N/A",
        "issue": "https://github.com/aliasrobotics/RVD/issues/38",
        "reproducibility": "",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

Demo

Input Value
Robot UR5
Vendor Universal Robots
CVE ID N/A
CWE ID Buffer Over-read (CWE-126)
RVSS Score 3.4
RVSS Vector RVSS:1.0/AV:PI/AC:H/PR:H/UI:R/Y:T/S:C/C:N/I:N/A:L/H:E
GitHub Account Jdjd
Date Reported 1989-09-09
Date Updated 1989-10-09
Exploitation vector Jdjdj

Description:

sjjsjd

Demonstration

Input Value
Robot Demonstration
Vendor Demonstration
CVE ID
CWE ID
RVSS Score
RVSS Vector <e.g:RVSS:1.0/AV:/AC:/PR:/UI:/Y:/S:/C:/I:/A:/H:>
GitHub Account aliasbot
Date Reported 2018-08-09
Date Updated
Exploitation vector <e.g.: Local network>

Component

  • Pick one:
    • Software:
    • Hardware: yes
    • Robot:

RVSS (paper):

  • Pick ATTACK VECTOR

    • Physical Isolated:
    • Physical Restricted:
    • Physical Public:
    • Local:
    • Internal Network:
    • Adjacent Network: yes
    • Remote Network:
  • Pick ATTACK COMPLEXITY

    • High: yes/no
    • Low:
  • PRIVILEGES REQUIRED

    • High: yes
    • Low:
    • None:
  • USER INTERACTION

    • Required: yes
    • None:
  • AGE

    • Unknown:
    • Zero Day: yes
    • 1 or less:
    • Less than 3:
    • More than 3:
  • SCOPE

    • Unchanged: yes
    • Changed:
  • CONFIDENTIALITY

    • None: yes
    • Low:
    • High:
  • INTEGRITY

    • None:
    • Low:
    • High: yes
  • AVAILABILITY

    • None:
    • Low: yes
    • High:
  • SAFETY

    • Unknown:
    • None: yes
    • Environmental:
    • Human:

Description:

Demonstration

RVD#41: Poor transport encryption

{
    "id": 41,
    "title": "RVD#41: Poor transport encryption",
    "type": "vulnerability",
    "description": "On  previous firmware versions of ABB's Service BoxThe device has outdated cryptographic libraries or ciphers, as explained above, also fall in this category.Web-based administration interfaces are not always on HTTPS despite being the main access point for management. Credits to Federico Maggi, Trend Micro Forward-Looking Threat Research, Davide Quarta, Marcello Pogliani, Mario Polino, Andrea M. Zanchettin, and Stefano Zanero, Politecnico di Milano",
    "cwe": "CWE-Inadequate Encryption Strength (CWE-326)",
    "cve": "None",
    "keywords": [
        "components hardware",
        "robot component: ABB's Service Box",
        "severity: high",
        "state: new",
        "vendor: ABB",
        "vulnerability"
    ],
    "system": "ABB's Service Box",
    "vendor": "ABB",
    "severity": {
        "rvss-score": "None",
        "rvss-vector": "RVSS:1.0/AV:RN/AC:L/PR:N/UI:N/Y:T/S:U/C:H/I:N/A:N/H:N",
        "severity-description": "",
        "cvss-score": 0,
        "cvss-vector": ""
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/41"
    ],
    "flaw": {
        "phase": "unknown",
        "specificity": "N/A",
        "architectural-location": "N/A",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-05-03",
        "detected-by": "",
        "detected-by-method": "N/A",
        "date-reported": "2017-05-03",
        "reported-by": "",
        "reported-by-relationship": "N/A",
        "issue": "https://github.com/aliasrobotics/RVD/issues/41",
        "reproducibility": "",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

RVD#33: Baxter and Sawyer expose their LAN ports on the pedestal

{
    "id": 33,
    "title": "RVD#33: Baxter and Sawyer expose their LAN ports on the pedestal",
    "type": "vulnerability",
    "description": "Baxter and Sawyer expose their LAN ports on the pedestal. These ports allow access to robot network services or add Modbus TCP capabilities.\r\nAccess to robot's network services can be achieved through these ports. Connecting an Ethernet cable allows sending commands/messages to robot services that are available through this interface.An attacker, who successfully started a connection to the ROS Master service can disable collision avoidance and detection mechanisms. Credits to: Cesar Cerrudo and Lucas Apa from IOActive",
    "cwe": "CWE-Command Injection - Generic (CWE-77)",
    "cve": "None",
    "keywords": [
        "malformed",
        "robot",
        "robot: Baxter",
        "robot: Sawyer",
        "severity: high",
        "state: new",
        "vendor: Rethink Robotics",
        "vulnerability"
    ],
    "system": "Baxter & Sawyer",
    "vendor": "Rethink Robotics",
    "severity": {
        "rvss-score": "None",
        "rvss-vector": "RVSS:1.0/AV:PI/AC:H/PR:N/UI:N/Y:T/S:U/C:N/I:H/A:H/H:H",
        "severity-description": "",
        "cvss-score": 0,
        "cvss-vector": ""
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/33"
    ],
    "flaw": {
        "phase": "unknown",
        "specificity": "N/A",
        "architectural-location": "N/A",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-03-01",
        "detected-by": "",
        "detected-by-method": "N/A",
        "date-reported": "2017-03-01",
        "reported-by": "",
        "reported-by-relationship": "N/A",
        "issue": "https://github.com/aliasrobotics/RVD/issues/33",
        "reproducibility": "",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

Demo

Input Value
Robot Others
Vendor N/A
CVE ID N/A
CWE ID Buffer Underflow (CWE-124)
RVSS Score 7.9
RVSS Vector RVSS:1.0/AV:L/AC:L/PR:L/UI:N/Y:Z/S:C/C:H/I:N/A:H/H:E
GitHub Account Dunai
Date Reported 2018-08-24
Date Updated N/A
Exploitation vector Local network

Description:

Third try

RVD#36: The PAL Robotics REEM-C exposes Ethernet and USB ports.

{
    "id": 36,
    "title": "RVD#36: The PAL Robotics REEM-C exposes Ethernet and USB ports.",
    "type": "vulnerability",
    "description": "The PAL Robotics REEM-C exposes Ethernet and USB ports.Robot joints can be controlled over these ports, robot actions updated/changed or configurations modified. Connecting a special USB device, that act as a keyboard, can type malicious commands9 to the robot or change settings. Credits to: Cesar Cerrudo and Lucas Apa from IOActive",
    "cwe": "CWE-Command Injection - Generic (CWE-77)",
    "cve": "None",
    "keywords": [
        "malformed",
        "robot",
        "robot: REEM-C",
        "severity: high",
        "state: new",
        "vendor: PAL Robotics",
        "vulnerability"
    ],
    "system": "REEM-C",
    "vendor": "PAL Robotics",
    "severity": {
        "rvss-score": "None",
        "rvss-vector": "RVSS:1.0/AV:PP/AC:H/PR:N/UI:N/Y:T/S:U/C:N/I:H/A:N/H:H",
        "severity-description": "",
        "cvss-score": 0,
        "cvss-vector": ""
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/36"
    ],
    "flaw": {
        "phase": "unknown",
        "specificity": "N/A",
        "architectural-location": "N/A",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-03-01",
        "detected-by": "",
        "detected-by-method": "N/A",
        "date-reported": "2017-03-01",
        "reported-by": "",
        "reported-by-relationship": "N/A",
        "issue": "https://github.com/aliasrobotics/RVD/issues/36",
        "reproducibility": "",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

RVD#3: Rovio improper implemented authentication

{
    "id": 3,
    "title": "RVD#3: Rovio improper implemented authentication",
    "type": "vulnerability",
    "description": " Improper implemented authentication mechanisms in WowWee Rovio could allow local network attackers to access sensitive information via web access to unsecure WebUI resources.On version 4.7b.201\r\n Credits to: Brian Dowling of Simplicity Communications disclosed this vulnerability to WowWee.",
    "cwe": "CWE-Missing Authorization (CWE-862)",
    "cve": "None",
    "keywords": [
        "malformed",
        "robot",
        "robot: Rovio",
        "severity: critical",
        "state: new",
        "vendor: WowWee",
        "vulnerability"
    ],
    "system": "Rovio",
    "vendor": "WowWee",
    "severity": {
        "rvss-score": "None",
        "rvss-vector": "RVSS:1.0/AV:RN/AC:L/PR:N/UI:N/Y:M/S:U/C:H/I:N/A:N/H:N",
        "severity-description": "",
        "cvss-score": 0,
        "cvss-vector": ""
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/3"
    ],
    "flaw": {
        "phase": "unknown",
        "specificity": "N/A",
        "architectural-location": "N/A",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2009-01-06",
        "detected-by": "",
        "detected-by-method": "N/A",
        "date-reported": "2009-01-06",
        "reported-by": "",
        "reported-by-relationship": "N/A",
        "issue": "https://github.com/aliasrobotics/RVD/issues/3",
        "reproducibility": "",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

Demonstration

Input Value
Robot UR10
Vendor Universal Robots
CVE ID N/A
CWE ID Information Disclosure (CWE-200)
RVSS Score 6.5
RVSS Vector RVSS:1.0/AV:IN/AC:L/PR:L/UI:R/Y:T/S:U/C:H/I:N/A:H/H:U
GitHub Account Demonstration
Date Reported 2018-08-09
Date Updated N/A
Exploitation vector Demonstration

Description:

Demonstration

dsadsa

Input Value
Robot Component Others
Vendor N/A
CVE ID N/A
CWE ID CRLF Injection (CWE-93)
RVSS Score 6.5
RVSS Vector RVSS:1.0/AV:RN/AC:L/PR:N/UI:R/Y:Z/S:U/C:H/I:N/A:N/H:U
GitHub Account shit
Date Reported 2018-08-08
Date Updated N/A
Exploitation vector shit

Description:

shit

RVD#43: Unsecured network and command injection

{
    "id": 43,
    "title": "RVD#43: Unsecured network and command injection",
    "type": "vulnerability",
    "description": "Insecure network and command injection, network exposed services are an important attack vector. An attacker with read and write access to an FTP exposed file system can abuse network services to directly control the robot's actions.\r\n  Acknowledgement: Davide Quarta, Marcello Pogliani, Mario Polino, Federico Maggi, Andrea M. Zanchettin, Stefano Zanero",
    "cwe": "CWE-Command Injection - Generic (CWE-77)",
    "cve": "None",
    "keywords": [
        "components hardware",
        "robot component: IRB140's main computer",
        "severity: critical",
        "state: new",
        "vendor: ABB",
        "vulnerability"
    ],
    "system": "IRB140's main computer",
    "vendor": "ABB",
    "severity": {
        "rvss-score": "None",
        "rvss-vector": "RVSS:1.0/AV:RN/AC:H/PR:N/UI:N/Y:T/S:U/C:N/I:H/A:N/H:H",
        "severity-description": "",
        "cvss-score": 0,
        "cvss-vector": ""
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/43"
    ],
    "flaw": {
        "phase": "unknown",
        "specificity": "N/A",
        "architectural-location": "N/A",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-05-03",
        "detected-by": "",
        "detected-by-method": "N/A",
        "date-reported": "2017-05-03",
        "reported-by": "",
        "reported-by-relationship": "N/A",
        "issue": "https://github.com/aliasrobotics/RVD/issues/43",
        "reproducibility": "",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

RVD#2: VGo Robot vulnerability

{
    "id": 2,
    "title": "RVD#2: VGo Robot vulnerability",
    "type": "vulnerability",
    "description": " An attacker may be able to capture firmware updates through the adjacent network.On versions prior to VGo Robot 3.0.3.52164 are vulnerable: 3.0.3, 3.0.2, 2.1.0, 2.0.0, 1.5.5, 1.5.0, 1.4.2\r\n Credits to: Daniel Regalado from Zingbox reported this vulnerability to NCCIC.",
    "cwe": "CWE-Cleartext Transmission of Sensitive Information (CWE-319)",
    "cve": "None",
    "keywords": [
        "malformed",
        "robot",
        "robot: Vgo",
        "severity: medium",
        "state: new",
        "vendor: Vecna",
        "vulnerability"
    ],
    "system": "VGo Robot",
    "vendor": "Vecna",
    "severity": {
        "rvss-score": "None",
        "rvss-vector": "RVSS:1.0/AV:AN/AC:L/PR:N/UI:N/Y:O/S:U/C:H/I:N/A:N/H:N",
        "severity-description": "",
        "cvss-score": 0,
        "cvss-vector": ""
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/2"
    ],
    "flaw": {
        "phase": "unknown",
        "specificity": "N/A",
        "architectural-location": "N/A",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2018-04-25 12:28:51",
        "detected-by": "",
        "detected-by-method": "N/A",
        "date-reported": "2018-04-25 12:28:51",
        "reported-by": "",
        "reported-by-relationship": "N/A",
        "issue": "https://github.com/aliasrobotics/RVD/issues/2",
        "reproducibility": "",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

RVD#10: Relative Path Traversal vulnerability in SREA-01 and SREA-50

{
    "id": 10,
    "title": "RVD#10: Relative Path Traversal vulnerability in SREA-01 and SREA-50",
    "type": "vulnerability",
    "description": " Relative Path Traversal vulnerability in SREA-01 and SREA-50 legacy remote monitoring tools and Ethernet adapters in ABB could access files on the affected products' file systems, view data, change configuration, retrieve password hash codes, and potentially insert and send commands to connected devices without authorization via HTTP request which refers to files using ../../ relative paths",
    "cwe": "CWE-22",
    "cve": "CVE-2017-9664",
    "keywords": [
        "components hardware",
        "severity: critical",
        "state: new",
        "vendor: ABB",
        "vulnerability"
    ],
    "system": "SREA-01 rev.A/B/C up to 3.31.5 SREA-50 rev.A up to 3.32.8",
    "vendor": "`ABB Asea Brown Boveri Ltd`",
    "severity": {
        "rvss-score": "10.0",
        "rvss-vector": "RVSS:1.0/AV:RN/AC:L/PR:N/UI:N/Y:M/S:U/C:L/I:H/A:H/H:N",
        "severity-description": "Critical",
        "cvss-score": 9.4,
        "cvss-vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H/"
    },
    "links": [
                "https://nvd.nist.gov/vuln/detail/CVE-2017-9664"
    ],
    "flaw": {
        "phase": "testing",
        "specificity": "Runtime-operation",
        "architectural-location": "Platform Code",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-06-14",
        "detected-by": "Bertin Jose, Ezequiel Fernandez",
        "detected-by-method": "testing_dynamic",
        "date-reported": "2018-08-07",
        "reported-by": "Alias Robotics",
        "reported-by-relationship": "Security Researcher",
        "issue": "https://github.com/aliasrobotics/RVD/issues/10",
        "reproducibility": "Always",
        "trace": "N/A",
        "reproduction": "N/A",
        "reproduction-image": "N/A"
    },
    "exploitation": {
        "description": "N/A",
        "exploitation-image": "N/A",
        "exploitation-vector": "N/A"
    },
    "mitigation": {
        "description": "Products are based on a legacy software platform which is no longer actively maintained. The problem is corrected by installing a patch that is available at the following location",
        "pull-request": "http://search-ext.abb.com/library/Download.aspx?DocumentID=9AKK107045A1782&LanguageCode=en&DocumentPartId=&Action=Launch",
        "date-mitigation": null,
    }
}

RVD#12: Authentication bypass vulnerability in SoftBank's Pepper and NAO robots's web console

{
    "id": 12,
    "title": "RVD#12: Authentication bypass vulnerability in SoftBank's Pepper and NAO robots's web console",
    "type": "vulnerability",
    "description": " An authentication bypass vulnerability in SoftBank's Pepper and NAO robots's web console could allow remote attackers to gain access to restricted resources and alter settings via web browser request tampering. Affects all versions",
    "cwe": "CWE-287",
    "cve": "None",
    "keywords": [
        "robot: NAO",
        "robot: Pepper",
        "vendor: SoftBank Robotics",
        "vulnerability"
    ],
    "system": "NAO / Pepper",
    "vendor": "SoftBank Robotics",
    "severity": {
        "rvss-score": 7.9,
        "rvss-vector": "RVSS:1.0/AV:IN/AC:L/PR:N/UI:R/Y:M/S:U/C:H/I:H/A:H/H:N",
        "severity-description": "High",
        "cvss-score": 8.8,
        "cvss-vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/"
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/14"
    ],
    "flaw": {
        "phase": "testing",
        "specificity": "general-issue",
        "architectural-location": "platform code",
        "application": "NaoQi",
        "subsystem": "web console",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-03-01",
        "detected-by": "Cesar Cerrudo and Lucas Apa from IOActive",
        "detected-by-method": "Testing dynamic",
        "date-reported": "2017-03-01",
        "reported-by": "Alias Robotics",
        "reported-by-relationship": "Security researcher",
        "issue": "https://github.com/aliasrobotics/RVD/issues/14",
        "reproducibility": "Always",
        "trace": "N/A",
        "reproduction": "N/A",
        "reproduction-image": "N/A"
    },
    "exploitation": {
        "description": "N/A",
        "exploitation-image": "N/A",
        "exploitation-vector": "N/A"
    },
    "mitigation": {
        "description": "N/A",
        "pull-request": "N/A",
        "date-mitigation": null
    }
}

rewrw

Input Value
Robot UR5
Vendor Universal Robots
CVE ID N/A
CWE ID Information Disclosure (CWE-200)
RVSS Score 6.5
RVSS Vector RVSS:1.0/AV:PR/AC:L/PR:L/UI:R/Y:T/S:U/C:H/I:N/A:H/H:U
GitHub Account rerwe
Date Reported 2018-08-08
Date Updated N/A
Exploitation vector rtrtwr

Description:

rewrewrwe

RVD#8: Missing authorization mechanisms in Robotis RoboPlus protocol

{
    "id": 8,
    "title": "RVD#8: Missing authorization mechanisms in Robotis RoboPlus protocol",
    "type": "vulnerability",
    "description": "Missing authorization mechanisms in Robotis RoboPlus protocol allow remote attackers to unauthorizedly control the robot via network communication.On version: 2015-03-26 Credits to: Cesar Cerrudo and Lucas Apa from IOActive",
    "cwe": "CWE-Missing Authorization (CWE-862)",
    "cve": "None",
    "keywords": [
        "components software",
        "robot component: OP2 Firmware",
        "severity: critical",
        "state: new",
        "vulnerability"
    ],
    "system": "OP2 Firmware",
    "vendor": "Robotis",
    "severity": {
        "rvss-score": "None",
        "rvss-vector": "RVSS:1.0/AV:IN/AC:L/PR:N/UI:N/Y:T/S:U/C:N/I:H/A:H/H:H",
        "severity-description": "",
        "cvss-score": 0,
        "cvss-vector": ""
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/8"
    ],
    "flaw": {
        "phase": "unknown",
        "specificity": "N/A",
        "architectural-location": "N/A",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-03-01",
        "detected-by": "",
        "detected-by-method": "N/A",
        "date-reported": "2017-03-01",
        "reported-by": "",
        "reported-by-relationship": "N/A",
        "issue": "https://github.com/aliasrobotics/RVD/issues/8",
        "reproducibility": "",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

RVD#5: ROS vulnerability affecting Raven 2 Robot: Denial of Service

{
    "id": 5,
    "title": "RVD#5: ROS vulnerability affecting Raven 2 Robot: Denial of Service",
    "type": "vulnerability",
    "description": " Improper message verification in Applied Dexterity's Raven 2 could allow man-in-the-middle attackers cause a Denial-of-Service situation by sending out of safety-range commands and triggering the safety stop mechanism via spoofed network traffic. Credits to: Tamara Bonaci, Jeffrey Herron, Tariq Yusuf, Junjie Yan, Tadayoshi Kohno, Howard Jay Chizeck from the University of Washington",
    "cwe": "CWE-Denial of Service (CWE-400)",
    "cve": "None",
    "keywords": [
        "components software",
        "robot component: ROS",
        "severity: critical",
        "vulnerability"
    ],
    "system": "ROS",
    "vendor": "N/A",
    "severity": {
        "rvss-score": 10.0,
        "rvss-vector": "RVSS:1.0/AV:RN/AC:L/PR:N/UI:N/Y:Z/S:U/C:L/I:H/A:H/H:H",
        "severity-description": "critical",
        "cvss-score": 9.4,
        "cvss-vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H"
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/5"
    ],
    "flaw": {
        "phase": "unknown",
        "specificity": "N/A",
        "architectural-location": "N/A",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2015-05-13",
        "detected-by": "",
        "detected-by-method": "N/A",
        "date-reported": "2015-05-13",
        "reported-by": "",
        "reported-by-relationship": "N/A",
        "issue": "https://github.com/aliasrobotics/RVD/issues/5",
        "reproducibility": "",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": ""
    }
}

Demonstration

Input Value
Robot Demonstration
Vendor Demonstration
CVE ID N/A
CWE ID Buffer Under-read (CWE-127)
RVSS Score 5.4
RVSS Vector RVSS:1.0/AV:AN/AC:L/PR:H/UI:R/Y:Z/S:U/C:L/I:L/A:H/H:N
GitHub Account Demonstration
Date Reported 2018-08-09
Date Updated N/A
Exploitation vector Demonstration

Description:

Demonstration

Demo

Input Value
Robot UR5
Vendor Universal Robots
CVE ID N/A
CWE ID Array Index Underflow (CWE-129)
RVSS Score 6.8
RVSS Vector RVSS:1.0/AV:AN/AC:H/PR:H/UI:N/Y:U/S:C/C:H/I:H/A:N/H:E
GitHub Account dmayoral
Date Reported 2018-08-21
Date Updated N/A
Exploitation vector Network

Description:

asda

Jajaka

Input Value
Robot UR3
Vendor Universal Robots
CVE ID N/A
CWE ID Array Index Underflow (CWE-129)
RVSS Score 5.6
RVSS Vector RVSS:1.0/AV:PR/AC:L/PR:N/UI:R/Y:Z/S:U/C:L/I:N/A:H/H:U
GitHub Account Jajaja
Date Reported 2018-08-08
Date Updated N/A
Exploitation vector Hahaha

Description:

hdhshaj

RVD#35: Pepper's head plastic lid can be easily removed to access the LAN port

{
    "id": 35,
    "title": "RVD#35: Pepper's head plastic lid can be easily removed to access the LAN port",
    "type": "vulnerability",
    "description": "Pepper's head plastic lid can be easily removed to access the LAN port. Port allows access to robot network services.Access to robot's network services can be achieved through these ports. Connecting an Ethernet cable allows sending commands/messages to robot services that are available through this interface. Credits to: Cesar Cerrudo and Lucas Apa from IOActive",
    "cwe": "CWE-Command Injection - Generic (CWE-77)",
    "cve": "None",
    "keywords": [
        "malformed",
        "robot",
        "robot: Pepper",
        "severity: high",
        "state: new",
        "vendor: SoftBank Robotics",
        "vulnerability"
    ],
    "system": "Pepper",
    "vendor": "SoftBank Robotics",
    "severity": {
        "rvss-score": "8.4",
        "rvss-vector": "RVSS:1.0/AV:PP/AC:H/PR:N/UI:N/Y:T/S:U/C:N/I:H/A:N/H:H",
        "severity-description": "high",
        "cvss-score": 4.2,
        "cvss-vector": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/35"
    ],
    "flaw": {
        "phase": "unknown",
        "specificity": "N/A",
        "architectural-location": "N/A",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-03-01",
        "detected-by": "",
        "detected-by-method": "N/A",
        "date-reported": "2017-03-01",
        "reported-by": "",
        "reported-by-relationship": "N/A",
        "issue": "https://github.com/aliasrobotics/RVD/issues/35",
        "reproducibility": "",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

Demo

Input Value
Robot UR10
Vendor Universal Robots
CVE ID N/A
CWE ID CRLF Injection (CWE-93)
RVSS Score 6.2
RVSS Vector RVSS:1.0/AV:PR/AC:L/PR:L/UI:R/Y:Z/S:U/C:H/I:N/A:H/H:U
GitHub Account Phone
Date Reported 2018-08-08
Date Updated N/A
Exploitation vector Gska

Description:

gjsjaj

RVD#16: Insecure transport in Rethink Robotics's Baxter & Sawyer Task Editor

{
    "id": 16,
    "title": "RVD#16: Insecure transport in Rethink Robotics's Baxter & Sawyer Task Editor",
    "type": "vulnerability",
    "description": "Insecure transport in Rethink Robotics's Baxter & Sawyer Task Editor could allow man-in-the-middle attackers to eavesdrop sensitive or security critical communications or affect integrity of sent data.On versions: All versions## Credits to: Cesar Cerrudo and Lucas Apa from IOActive",
    "cwe": "CWE-Cleartext Transmission of Sensitive Information (CWE-319)",
    "cve": "None",
    "keywords": [
        "components software",
        "malformed",
        "robot",
        "robot component: Sawyer Task Editor",
        "robot: Baxter",
        "severity: critical",
        "state: new",
        "vendor: Rethink Robotics",
        "vulnerability"
    ],
    "system": "Baxter/Sawyer Task Editor",
    "vendor": "Rethink Robotics",
    "severity": {
        "rvss-score": "None",
        "rvss-vector": "RVSS:1.0/AV:RN/AC:H/PR:N/UI:N/Y:T/S:U/C:H/I:H/A:L/H:H",
        "severity-description": "",
        "cvss-score": 0,
        "cvss-vector": ""
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/16"
    ],
    "flaw": {
        "phase": "unknown",
        "specificity": "N/A",
        "architectural-location": "N/A",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-03-01",
        "detected-by": "",
        "detected-by-method": "N/A",
        "date-reported": "2017-03-01",
        "reported-by": "",
        "reported-by-relationship": "N/A",
        "issue": "https://github.com/aliasrobotics/RVD/issues/16",
        "reproducibility": "",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

RVD#40: Previous firmware revisions to 11.2s2 are vulnerable to authentication bypass

{
    "id": 40,
    "title": "RVD#40: Previous firmware revisions to 11.2s2 are vulnerable to authentication bypass",
    "type": "vulnerability",
    "description": "After analyzing ABB\u2019s Service Box device in a black box fashion and discovered a severe authentication-bypass vulnerability that allows an attacker to read the configuration and some device information (e.g., event logs) without knowing the administrator password. This vulnerability was disclosed to the vendor (through ABB), which fixed the issue in the latest firmware revision (11.2s2).## Credits to Federico Maggi, Trend Micro Forward-Looking Threat Research, Davide Quarta, Marcello Pogliani, Mario Polino, Andrea M. Zanchettin, and Stefano Zanero, Politecnico di Milano",
    "cwe": "CWE-Improper Authentication - Generic (CWE-287)",
    "cve": "None",
    "keywords": [
        "components hardware",
        "robot component: ABB's Service Box",
        "severity: high",
        "state: new",
        "vendor: ABB",
        "vulnerability"
    ],
    "system": "ABB's Service Box",
    "vendor": "ABB",
    "severity": {
        "rvss-score": "None",
        "rvss-vector": "RVSS:1.0/AV:RN/AC:L/PR:N/UI:N/Y:T/S:U/C:H/I:N/A:N/H:N",
        "severity-description": "",
        "cvss-score": 0,
        "cvss-vector": ""
    },
    "links": [
        "https://github.com/aliasrobotics/RVD/issues/40"
    ],
    "flaw": {
        "phase": "unknown",
        "specificity": "N/A",
        "architectural-location": "N/A",
        "application": "N/A",
        "subsystem": "N/A",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-05-03",
        "detected-by": "",
        "detected-by-method": "N/A",
        "date-reported": "2017-05-03",
        "reported-by": "",
        "reported-by-relationship": "N/A",
        "issue": "https://github.com/aliasrobotics/RVD/issues/40",
        "reproducibility": "",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

fgdgf

Input Value
Robot UR5
Vendor Universal Robots
CVE ID N/A
CWE ID Buffer Over-read (CWE-126)
RVSS Score 0.0
RVSS Vector RVSS:1.0/AV:L/AC:L/PR:H/UI:N/Y:U/S:U/C:N/I:N/A:N/H:U
GitHub Account gf
Date Reported 2018-08-08
Date Updated N/A
Exploitation vector werfg

Description:

qwef

test

Input Value
Robot test
Vendor test
CVE ID N/A
CWE ID Array Index Underflow (CWE-129)
RVSS Score 0.0
RVSS Vector RVSS:1.0/AV:PI/AC:H/PR:H/UI:R/Y:U/S:U/C:N/I:N/A:N/H:U
GitHub Account test
Date Reported 2010-02-02
Date Updated N/A
Exploitation vector test

Description:

test

Demonstration

Input Value
Robot Demonstration
Vendor Demonstration
CVE ID N/A
CWE ID Buffer Under-read (CWE-127)
RVSS Score 6.8
RVSS Vector RVSS:1.0/AV:RN/AC:L/PR:L/UI:R/Y:Z/S:U/C:L/I:L/A:H/H:N
GitHub Account Demonstration
Date Reported 2018-08-09
Date Updated N/A
Exploitation vector Demonstration

Description:

Demonstration

Demonstration

Input Value
Robot Demonstration
Vendor Demonstration
CVE ID N/A
CWE ID Buffer Underflow (CWE-124)
RVSS Score 5.2
RVSS Vector RVSS:1.0/AV:RN/AC:L/PR:H/UI:R/Y:Z/S:U/C:N/I:L/A:H/H:N
GitHub Account Demonstration
Date Reported 2018-08-09
Date Updated N/A
Exploitation vector Demonstration

Description:

Demonstration

RVD#34: Universal Robots Controller supports wireless mouse/keyboards on their USB interface

{
    "id": 34,
    "title": "RVD#34: Universal Robots Controller supports wireless mouse/keyboards on their USB interface",
    "type": "vulnerability",
    "description": "Universal Robots Controller supports wireless mouse/keyboards on their USB interface. A special USB device acting as a keyboard can inject keystrokes to potentially change settings on the robot or manipulate actions.Robot joints can be controlled over these ports, robot actions updated/changed or configurations modified. Connecting a special USB device, that act as a keyboard, can type malicious commands to the robot or change settings. Credits to: Cesar Cerrudo and Lucas Apa from IOActive",
    "cwe": "CWE-Command Injection - Generic (CWE-77)",
    "cve": "None",
    "keywords": [
        "components hardware",
        "robot component: Universal Robots Controller",
        "severity: high",
        "state: new",
        "vendor: Universal Robots",
        "vulnerability"
    ],
    "system": "Universal Robots Controller",
    "vendor": "Universal Robots",
    "severity": {
        "rvss-score": 7.0,
        "rvss-vector": "RVSS:1.0/AV:PI/AC:H/PR:N/UI:N/Y:T/S:U/C:N/I:H/A:N/H:H",
        "severity-description": "high",
        "cvss-score": 4.2,
        "cvss-vector": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
    },
    "links": [
        "https://ioactive.com/pdfs/Hacking-Robots-Before-Skynet-Technical-Appendix.pdf",
        "https://ioactive.com/exploiting-industrial-collaborative-robots/",
        "https://github.com/aliasrobotics/RVD/issues/34"
    ],
    "flaw": {
        "phase": "testing",
        "specificity": "subject-specific",
        "architectural-location": "application-specific code",
        "application": "manipulation",
        "subsystem": "actuation:manipulator",
        "package": "N/A",
        "languages": "None",
        "date-detected": "2017-03-01",
        "detected-by": "Lucas Apa (IOActive)",
        "detected-by-method": "testing violation",
        "date-reported": "2017-03-01",
        "reported-by": "Lucas Apa (IOActive)",
        "reported-by-relationship": "security researcher",
        "issue": "https://github.com/aliasrobotics/RVD/issues/6",
        "reproducibility": "always",
        "trace": null,
        "reproduction": "",
        "reproduction-image": ""
    },
    "exploitation": {
        "description": "",
        "exploitation-image": "",
        "exploitation-vector": ""
    },
    "mitigation": {
        "description": "",
        "pull-request": "",
        "date-mitigation": null
    }
}

Demo

Input Value
Robot UR3
Vendor Universal Robots
CVE ID N/A
CWE ID CRLF Injection (CWE-93)
RVSS Score 7.2
RVSS Vector RVSS:1.0/AV:PR/AC:L/PR:N/UI:R/Y:M/S:U/C:H/I:N/A:H/H:U
GitHub Account xabierpb
Date Reported 1986-04-05
Date Updated 1986-04-05
Exploitation vector cbz

Description:

zxbczcbzzcxb

Demo

Input Value
Robot Sawyer
Vendor Rethink Robotics
CVE ID N/A
CWE ID Client-Side Enforcement of Server-Side Security (CWE-602)
RVSS Score 10.0
RVSS Vector RVSS:1.0/AV:RN/AC:L/PR:N/UI:R/Y:T/S:C/C:H/I:H/A:N/H:H
GitHub Account Unaiayu
Date Reported 2018-08-24
Date Updated N/A
Exploitation vector Local network

Description:

This is a second try

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.