Ghost Robotics Vision 60 v0.27.2 includes, among its physical interfaces, three RJ45 connectors and a USB Type-C port. The vulnerability is due to the lack of authentication mechanisms when establishing connections through these ports. Specifically, with regard to network connectivity, the robot's internal router automatically assigns IP addresses to any device physically connected to it. An attacker could connect a WiFi access point under their control to gain access to the robot's network without needing the credentials for the deployed network. Once inside, the attacker can monitor all its data, as the robot runs on ROS 2 without authentication by default.
Metrics
Affected Vendors & Products
References
History
Thu, 23 Oct 2025 10:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ghost Robotics
Ghost Robotics vision 60 |
|
Vendors & Products |
Ghost Robotics
Ghost Robotics vision 60 |
Wed, 22 Oct 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 22 Oct 2025 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Ghost Robotics Vision 60 v0.27.2 includes, among its physical interfaces, three RJ45 connectors and a USB Type-C port. The vulnerability is due to the lack of authentication mechanisms when establishing connections through these ports. Specifically, with regard to network connectivity, the robot's internal router automatically assigns IP addresses to any device physically connected to it. An attacker could connect a WiFi access point under their control to gain access to the robot's network without needing the credentials for the deployed network. Once inside, the attacker can monitor all its data, as the robot runs on ROS 2 without authentication by default. | |
Title | Use of Hard-coded Credentials vulnerability in Ghost Robotics' Vision 60 | |
Weaknesses | CWE-798 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: INCIBE
Published: 2025-10-22T08:15:42.407Z
Updated: 2025-10-22T15:49:54.819Z
Reserved: 2025-04-16T09:09:39.343Z
Link: CVE-2025-41109

Updated: 2025-10-22T15:49:45.446Z

Status : Awaiting Analysis
Published: 2025-10-22T09:15:36.617
Modified: 2025-10-22T21:12:48.953
Link: CVE-2025-41109

No data.