Q
Problem solve Get help with specific problems with your technologies, process and projects.

How do newly found flaws affect robot controllers?

Several vulnerabilities were found in controllers made by Universal Robots. Discover what these controllers are used for and how threat actors can exploit these vulnerabilities.

Researchers recently found vulnerabilities within the robot controllers from Universal Robots, a Danish manufacturer...

of robotic arms. What are these robot controllers used for and how can threat actors exploit these vulnerabilities?

Robot controllers from Universal Robots are used to automate processing tasks, including product assembly, painting, labeling, packing and welding. They can also be used for machine tending, quality inspection, lab analysis and testing.

A developer can download manuals, drawings and robot software for Universal Robots controllers, as well as basic software that enables users to customize start and stop times and collision detections.

Researchers found two vulnerabilities in the Universal Robots product line, both of which earned a Common Vulnerability Scoring System severity rating of 9.8 out of 10 for being exploitable remotely and requiring only a low level of skill to exploit. In both cases, the vulnerabilities enable attackers to access the robot controllers without authorization.

The first vulnerability, tracked as CVE-2018-10633, involves hardcoded credentials that can be remotely used by attackers to reset the controller's passwords.

The second vulnerability, tracked as CVE-2018-10635, is caused because the application is missing an authentication process for a critical function. The robot controller software is hardcoded to listen to TCP ports 30001 and 30003 for arbitrary code.

However, a remote attacker can execute code written in URScript, the Universal Robots scripting language, simply by sending it to either of those ports. By doing so, an attacker could take control over the robotic arm and cause it to move in any direction with the potential to cause harm.

The vulnerabilities in the Universal Robots controllers were the subject of an advisory from the United States Department of Homeland Security Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) in July 2018. The vulnerabilities were discovered by Davide Quarta, Mario Polino, Marcello Pogliani, and Stefano Zanero from Politecnico di Milano and Federico Maggi with Trend Micro.

According to the ICS-CERT alert, Universal Robots advised that these vulnerabilities could be mitigated by:

  • Restricting access to vulnerable devices; only authorized and trusted users should have physical access to the devices.
  • Keeping the vulnerable device isolated from all networks, unless connection is required by the application.
  • Keeping the vulnerable device isolated from the public internet using a firewall that blocks TCP ports 30001 and 30003.
  • Using the smallest possible private subnet to reduce the attack surface if the device must be connected to a network.

The ICS-CERT alert also included recommendations to minimize network exposure using firewalls, VPNs and restricted access networks.

Ask the expert:
Want to ask Judith Myerson a question about security? Submit your question now via email. (All questions are anonymous.)

This was last published in October 2018

Dig Deeper on Platform security

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

How have these Universal Robots vulnerabilities affected your enterprise?
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close