Search criteria

2 vulnerabilities found for PolyScope 5 by Universal Robots

CVE-2026-8153 (GCVE-0-2026-8153)

Vulnerability from nvd – Published: 2026-05-08 11:45 – Updated: 2026-05-11 09:27
VLAI?
Title
Command injection in Dashboard Server interface
Summary
OS command injection in Dashboard Server interface in Universal Robots PolyScope versions prior to 5.25.1 allows unauthenticated attacker to craft commands that will execute code on the robot's OS.
CWE
  • CWE-78 - Improper neutralization of special elements used in an OS command ('OS command injection')
Assigner
TRO
Impacted products
Vendor Product Version
Universal Robots PolyScope 5 Affected: 0 , < 5.25.1 (semver)
Create a notification for this product.
Credits
Vera Mens of Claroty Team82
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-8153",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-05-08T12:46:58.925917Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-05-08T12:47:12.421Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "PolyScope 5",
          "vendor": "Universal Robots",
          "versions": [
            {
              "lessThan": "5.25.1",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Only applicable if Dashboard Server interface is active"
            }
          ],
          "value": "Only applicable if Dashboard Server interface is active"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Vera Mens of Claroty Team82"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "OS command injection in Dashboard Server interface in Universal Robots PolyScope versions prior to\u0026nbsp;5.25.1\u0026nbsp;allows unauthenticated attacker to\u0026nbsp;craft commands that will execute code on the robot\u0027s OS."
            }
          ],
          "value": "OS command injection in Dashboard Server interface in Universal Robots PolyScope versions prior to\u00a05.25.1\u00a0allows unauthenticated attacker to\u00a0craft commands that will execute code on the robot\u0027s OS."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88 OS Command Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper neutralization of special elements used in an OS command (\u0027OS command injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-11T09:27:08.778Z",
        "orgId": "1b7e193f-2525-49a1-b171-84af8827c9eb",
        "shortName": "TRO"
      },
      "references": [
        {
          "url": "https://www.universal-robots.com/developer/communication-protocol/dashboard-server/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update to version\u0026nbsp;5.25.1\u0026nbsp;or later, or disable Dashboard Server interface"
            }
          ],
          "value": "Update to version\u00a05.25.1\u00a0or later, or disable Dashboard Server interface"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Command injection in Dashboard Server interface",
      "x_generator": {
        "engine": "Vulnogram 1.0.2"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1b7e193f-2525-49a1-b171-84af8827c9eb",
    "assignerShortName": "TRO",
    "cveId": "CVE-2026-8153",
    "datePublished": "2026-05-08T11:45:18.462Z",
    "dateReserved": "2026-05-08T08:20:00.514Z",
    "dateUpdated": "2026-05-11T09:27:08.778Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-8153 (GCVE-0-2026-8153)

Vulnerability from cvelistv5 – Published: 2026-05-08 11:45 – Updated: 2026-05-11 09:27
VLAI?
Title
Command injection in Dashboard Server interface
Summary
OS command injection in Dashboard Server interface in Universal Robots PolyScope versions prior to 5.25.1 allows unauthenticated attacker to craft commands that will execute code on the robot's OS.
CWE
  • CWE-78 - Improper neutralization of special elements used in an OS command ('OS command injection')
Assigner
TRO
Impacted products
Vendor Product Version
Universal Robots PolyScope 5 Affected: 0 , < 5.25.1 (semver)
Create a notification for this product.
Credits
Vera Mens of Claroty Team82
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-8153",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-05-08T12:46:58.925917Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-05-08T12:47:12.421Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "PolyScope 5",
          "vendor": "Universal Robots",
          "versions": [
            {
              "lessThan": "5.25.1",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "configurations": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Only applicable if Dashboard Server interface is active"
            }
          ],
          "value": "Only applicable if Dashboard Server interface is active"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Vera Mens of Claroty Team82"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "OS command injection in Dashboard Server interface in Universal Robots PolyScope versions prior to\u0026nbsp;5.25.1\u0026nbsp;allows unauthenticated attacker to\u0026nbsp;craft commands that will execute code on the robot\u0027s OS."
            }
          ],
          "value": "OS command injection in Dashboard Server interface in Universal Robots PolyScope versions prior to\u00a05.25.1\u00a0allows unauthenticated attacker to\u00a0craft commands that will execute code on the robot\u0027s OS."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88 OS Command Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper neutralization of special elements used in an OS command (\u0027OS command injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-05-11T09:27:08.778Z",
        "orgId": "1b7e193f-2525-49a1-b171-84af8827c9eb",
        "shortName": "TRO"
      },
      "references": [
        {
          "url": "https://www.universal-robots.com/developer/communication-protocol/dashboard-server/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Update to version\u0026nbsp;5.25.1\u0026nbsp;or later, or disable Dashboard Server interface"
            }
          ],
          "value": "Update to version\u00a05.25.1\u00a0or later, or disable Dashboard Server interface"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Command injection in Dashboard Server interface",
      "x_generator": {
        "engine": "Vulnogram 1.0.2"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1b7e193f-2525-49a1-b171-84af8827c9eb",
    "assignerShortName": "TRO",
    "cveId": "CVE-2026-8153",
    "datePublished": "2026-05-08T11:45:18.462Z",
    "dateReserved": "2026-05-08T08:20:00.514Z",
    "dateUpdated": "2026-05-11T09:27:08.778Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}