Ghost Robotics Vision 60 v0.27.2 includes, among its physical interfaces, three RJ45 connectors and a USB Type-C port. The vulnerability is due to the lack of authentication mechanisms when establishing connections through these ports. Specifically, with regard to network connectivity, the robot's internal router automatically assigns IP addresses to any device physically connected to it. An attacker could connect a WiFi access point under their control to gain access to the robot's network without needing the credentials for the deployed network. Once inside, the attacker can monitor all its data, as the robot runs on ROS 2 without authentication by default.
History

Fri, 31 Oct 2025 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Ghostrobotics
Ghostrobotics vision 60
Ghostrobotics vision 60 Firmware
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:h:ghostrobotics:vision_60:-:*:*:*:*:*:*:*
cpe:2.3:o:ghostrobotics:vision_60_firmware:0.27.2:*:*:*:*:*:*:*
Vendors & Products Ghostrobotics
Ghostrobotics vision 60
Ghostrobotics vision 60 Firmware
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Thu, 23 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Ghost Robotics
Ghost Robotics vision 60
Vendors & Products Ghost Robotics
Ghost Robotics vision 60

Wed, 22 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Oct 2025 08:30:00 +0000

Type Values Removed Values Added
Description Ghost Robotics Vision 60 v0.27.2 includes, among its physical interfaces, three RJ45 connectors and a USB Type-C port. The vulnerability is due to the lack of authentication mechanisms when establishing connections through these ports. Specifically, with regard to network connectivity, the robot's internal router automatically assigns IP addresses to any device physically connected to it. An attacker could connect a WiFi access point under their control to gain access to the robot's network without needing the credentials for the deployed network. Once inside, the attacker can monitor all its data, as the robot runs on ROS 2 without authentication by default.
Title Use of Hard-coded Credentials vulnerability in Ghost Robotics' Vision 60
Weaknesses CWE-798
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published: 2025-10-22T08:15:42.407Z

Updated: 2025-10-22T15:49:54.819Z

Reserved: 2025-04-16T09:09:39.343Z

Link: CVE-2025-41109

cve-icon Vulnrichment

Updated: 2025-10-22T15:49:45.446Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-22T09:15:36.617

Modified: 2025-10-31T19:39:30.097

Link: CVE-2025-41109

cve-icon Redhat

No data.