Skip to main content

CVE-2025-60250: CWE-321 Use of Hard-coded Cryptographic Key in Unitree Go2

Medium
VulnerabilityCVE-2025-60250cvecve-2025-60250cwe-321
Published: Fri Sep 26 2025 (09/26/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Unitree
Product: Go2

Description

Unitree Go2, G1, H1, and B2 devices through 2025-09-20 decrypt BLE packet data by using the df98b715d5c6ed2b25817b6f2554124a key and the 2841ae97419c2973296a0d4bdfe19a4f IV.

AI-Powered Analysis

AILast updated: 09/26/2025, 01:19:29 UTC

Technical Analysis

CVE-2025-60250 is a medium-severity vulnerability identified in Unitree's robotic devices, specifically the Go2, G1, H1, and B2 models. The vulnerability arises from the use of a hard-coded cryptographic key (df98b715d5c6ed2b25817b6f2554124a) and initialization vector (IV) (2841ae97419c2973296a0d4bdfe19a4f) to decrypt Bluetooth Low Energy (BLE) packet data. This practice violates secure cryptographic principles as hard-coded keys are static and can be extracted by attackers through reverse engineering or firmware analysis. Once the key and IV are known, an adversary can decrypt BLE communications between the device and its controller or other peripherals, potentially allowing them to intercept sensitive data or manipulate device behavior. The vulnerability has a CVSS 3.1 base score of 4.7, reflecting a medium severity level. The vector string (AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N) indicates that the attack requires adjacent network access (e.g., Bluetooth proximity), has low attack complexity, requires no privileges or user interaction, and impacts integrity with a scope change, but does not affect confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been published as of the vulnerability disclosure date (September 26, 2025). The affected devices are robotic platforms used in various applications including research, inspection, and potentially commercial or industrial environments. The CWE-321 classification highlights the fundamental cryptographic weakness of embedding static keys in code, which undermines the security of encrypted communications and can facilitate unauthorized control or data manipulation.

Potential Impact

For European organizations deploying Unitree robotic devices, this vulnerability could lead to unauthorized manipulation of robotic operations or interception of BLE communications. Although confidentiality is not directly impacted, the integrity of commands and data exchanged with the devices can be compromised, potentially causing operational disruptions or safety risks if robots are used in sensitive environments such as manufacturing, logistics, or research facilities. The requirement for adjacent network access limits remote exploitation but does not eliminate risk in environments where attackers can gain physical proximity, such as warehouses, campuses, or public spaces. The scope change in the CVSS vector suggests that a successful exploit could affect components beyond the initially targeted BLE communication channel, potentially impacting the broader system controlling the robot. Given the increasing adoption of robotics in European industries and research institutions, this vulnerability could undermine trust in robotic automation and necessitate additional security controls to prevent misuse.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first monitor Unitree's official channels for firmware updates or patches addressing the hard-coded key issue and apply them promptly once available. In the absence of patches, organizations should implement compensating controls such as restricting physical and Bluetooth access to the robots by enforcing strict access controls and using Bluetooth signal jamming or shielding in sensitive areas to prevent unauthorized proximity. Network segmentation and monitoring of BLE traffic can help detect anomalous communication attempts. Additionally, organizations should consider deploying endpoint detection solutions capable of identifying unusual commands or behaviors from the robots. For future procurement, organizations should require vendors to follow secure cryptographic practices, including dynamic key management and secure key storage mechanisms. Finally, conducting regular security assessments and penetration tests focusing on BLE communications and robotic control interfaces will help identify and remediate related weaknesses.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d5e6869e21be37e938873b

Added to database: 9/26/2025, 1:04:06 AM

Last enriched: 9/26/2025, 1:19:29 AM

Last updated: 9/26/2025, 1:54:20 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats