Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41110: CWE-287 Improper Authentication in Ghost Robotics Vision 60

0
High
VulnerabilityCVE-2025-41110cvecve-2025-41110cwe-287
Published: Wed Oct 22 2025 (10/22/2025, 08:16:24 UTC)
Source: CVE Database V5
Vendor/Project: Ghost Robotics
Product: Vision 60

Description

Encrypted WiFi and SSH credentials were found in the Ghost Robotics Vision 60 v0.27.2 APK. This vulnerability allows an attacker to connect to the robot's WiFi and view all its data, as it runs on ROS 2 without default authentication. In addition, the attacker can connect via SSH and gain full control of the robot, which could cause physical damage to the robot itself or its environment.

AI-Powered Analysis

AILast updated: 10/22/2025, 08:36:59 UTC

Technical Analysis

CVE-2025-41110 identifies a critical security flaw in the Ghost Robotics Vision 60 robot, specifically version 0.27.2 of its APK. The vulnerability stems from improper authentication mechanisms (CWE-287) where encrypted WiFi and SSH credentials are embedded within the application package. This design flaw allows an attacker to connect to the robot’s WiFi network and SSH interface without proper authentication, exploiting the fact that the robot runs ROS 2 middleware which, by default, lacks authentication controls. Once connected, the attacker can access all data transmitted by the robot and gain full control over its operations. This includes the ability to manipulate the robot’s physical movements or functions, potentially causing damage to the robot itself or its environment. The CVSS 4.0 vector indicates the attack requires physical proximity (AV:P), no privileges or user interaction, and results in high confidentiality, integrity, and availability impacts. The vulnerability is particularly dangerous because it allows remote control without authentication, increasing the attack surface significantly. No patches or fixes are currently linked, and no exploits have been reported in the wild, but the risk remains high due to the nature of the device and its operational contexts. The vulnerability was reserved in April 2025 and published in October 2025 by INCIBE, highlighting its recent discovery and disclosure.

Potential Impact

For European organizations, the impact of CVE-2025-41110 is substantial, especially for those deploying Ghost Robotics Vision 60 robots in industrial automation, research, defense, or critical infrastructure monitoring. Unauthorized access to the robot’s WiFi and SSH interfaces can lead to data breaches, loss of operational control, and physical damage to equipment or environments. This could disrupt business operations, cause safety hazards, and result in financial losses or reputational damage. The lack of authentication on ROS 2 increases the risk of lateral movement within networks if the robot is connected to broader systems. Organizations relying on these robots for sensitive tasks may face compliance issues with data protection regulations such as GDPR if data confidentiality is compromised. The physical nature of the threat also raises concerns about sabotage or espionage, particularly in sectors like manufacturing or defense. Given the high severity and ease of exploitation, European entities must prioritize mitigation to prevent potential attacks.

Mitigation Recommendations

To mitigate CVE-2025-41110, organizations should first isolate the Vision 60 robots on segmented, secure networks with strict access controls to prevent unauthorized WiFi connections. Remove or replace the vulnerable APK version 0.27.2 with updated software once available, or disable the embedded credentials if possible. Implement strong authentication mechanisms on ROS 2 middleware, such as enabling DDS Security plugins that provide authentication, encryption, and access control. Regularly audit and monitor network traffic to and from the robots for anomalous activity. Employ network-level protections like VPNs or WPA3 Enterprise for WiFi connections to enhance security. If patching is not immediately possible, consider physical security controls to restrict proximity access to the robots. Engage with Ghost Robotics for official patches or guidance and update operational procedures to include security checks for robotic systems. Finally, conduct staff training on the risks of robotic system vulnerabilities and incident response plans tailored to robotic asset compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:09:39.344Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f8942bd59611fbd95e6918

Added to database: 10/22/2025, 8:22:03 AM

Last enriched: 10/22/2025, 8:36:59 AM

Last updated: 10/23/2025, 9:15:58 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats