Multiple vulnerabilities in Universal Robots Robot Controllers

Published: 2018-07-11 13:20:55 | Updated: 2018-07-11 13:21:29
Severity High
Patch available NO
Number of vulnerabilities 2
CVE ID CVE-2018-10633
CVE-2018-10635
CVSSv3 5.8 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:W/RC:C]
8.9 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:W/RC:C]
CWE ID CWE-798
CWE-306
Exploitation vector Network
Public exploit Not available
Vulnerable software SW
CB
Vulnerable software versions SW 3.4.5-100
CB 3.1
Vendor URL Universal Robots

Security Advisory

1) Use of hard-coded credentials

Description

The vulnerability allows a remote attacker to reset passwords for the controller on the target system.

The vulnerability exists due to the application utilizes hard-coded credentials. A remote unauthenticated attacker can reset passwords for the controller.

Remediation

Universal Robots recommends the follow remedial actions:

  • Only allow trusted users physical access to the robot control box and teach pendant.
  • Do not connect the robot to a network unless it is required by the application.
  • Do not connect the robot directly to the internet. Use a secure network with proper firewall configuration (Ports 30001/TCP to 30003/TCP must be restricted).
  • Make the private subnet where the robot network interface is exposed as small as possible.

External links

https://ics-cert.us-cert.gov/advisories/ICSA-18-191-01

2) Authentication bypass

Description

The vulnerability allows a remote attacker to bypass authentication on the target system.

The vulnerability exists due to ports 30001/TCP to 30003/TCP listen for arbitrary URScript code. A remote unauthenticated attacker who has access to the ports can bypass authentication and execute arbitrary code that may allow root access to be obtained.

Remediation

Universal Robots recommends the follow remedial actions:

  • Only allow trusted users physical access to the robot control box and teach pendant.
  • Do not connect the robot to a network unless it is required by the application.
  • Do not connect the robot directly to the internet. Use a secure network with proper firewall configuration (Ports 30001/TCP to 30003/TCP must be restricted).
  • Make the private subnet where the robot network interface is exposed as small as possible.

External links

https://ics-cert.us-cert.gov/advisories/ICSA-18-191-01

Back to List