PSA-010: Insecure Defaults for Robots

Last modified: 24 Sept 2025

CVE-2020-10279

Note

This Product Security Advisory is based on a thorough investigation and all findings that were available at the time of publication. Should new information on the matter become available, it is possible that the initial assessment changes and the Advisory will be updated.

Statement

We hereby inform that the following MiR products:

Product

Software version

MiR Robots

< 2.8.3

MiR Fleet

< 2.8.3

are affected by:

CVE

CVSS score

Customer Risk (MiR Score)

CVE-2020-10279

9.8

High

Overview

MiR products used the Ubuntu Server 16.04 LTS operating system. In software versions before 2.8.3 the system was configured with insecure defaults, allowing an authorized local attacker with access to the robot operating system to perform privilege escalation or cause denial of service.

It is important to note that the accounts used in the web interface are not accounts on the robot operating system. Only MiR support has access to the robot operating system, making this vulnerability relatively difficult to exploit for attackers.

Nevertheless, we strongly recommend always keeping MiR software versions up to date, as we continue to provide updates and security patches.

References

NIST NVD entry: https://nvd.nist.gov/vuln/detail/CVE-2020-10279

Mitigations

  • Operating system settings are improved, OS has been patched.

  • Robot SW version 3 has a new operating system which replaces Ubuntu 16.04.


Recommended Actions

  • Install new software versions, especially patches, as provided by MiR. At least software version 2.8.3 is required to mitigate this vulnerability.

  • Upgrade to Robot SW version 3.

Revision history

Date

Description

2025-09-24

Revised as part of a webpage update

2022-08-11

Document name and visual update. Update for SW version 3.

2021-05-27

Initial Advisory publication