Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1442: CWE-321: Use of Hard-coded Cryptographic Key in Unitree UPK

0
High
VulnerabilityCVE-2026-1442cvecve-2026-1442cwe-321
Published: Fri Feb 27 2026 (02/27/2026, 04:28:46 UTC)
Source: CVE Database V5
Vendor/Project: Unitree
Product: UPK

Description

CVE-2026-1442 is a high-severity vulnerability affecting Unitree's UPK firmware update process, including models like Unitree Go2. The issue stems from the use of a hard-coded cryptographic key to encrypt firmware updates, which is accessible to attackers or observers. This allows unauthorized users to alter firmware updates and have them trusted by the device, compromising confidentiality, integrity, and availability. Although no public exploits are known, the vulnerability affects all current Unitree products as of February 2026. Exploitation requires local access (AV:L) and user interaction (UI:R), but no privileges are needed (PR:N). Organizations using Unitree robotic products should urgently review firmware update mechanisms and monitor for suspicious activity. Mitigations include restricting physical access, monitoring update integrity, and urging Unitree to release patches or improved cryptographic protections. Countries with significant deployments of Unitree robots, including the United States, China, Japan, South Korea, Germany, and others, face the highest risk due to market presence and strategic use of robotics.

AI-Powered Analysis

AILast updated: 02/27/2026, 16:25:25 UTC

Technical Analysis

CVE-2026-1442 is a vulnerability categorized under CWE-321, indicating the use of hard-coded cryptographic keys within Unitree's UPK firmware update system. The encryption protecting firmware updates is itself encrypted using key material embedded in the product, which attackers can obtain or deduce. This design flaw allows attackers to modify firmware updates and have the compromised firmware accepted as legitimate by Unitree devices such as the Unitree Go2 and other models. The vulnerability affects all current Unitree offerings as of February 26, 2026, impacting both the firmware generation and extraction processes. The cryptographic weakness undermines the fundamental trust model of firmware updates, potentially enabling attackers to inject malicious code, disrupt device operation, or exfiltrate sensitive data. Exploitation requires local access to the device or update process and user interaction, but no elevated privileges are necessary. Although no known exploits are publicly documented, the vulnerability's presence in widely deployed robotic platforms poses a significant security risk. The CVSS v3.1 score of 7.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity but limited attack vector (local). The lack of available patches at the time of disclosure necessitates immediate risk management and mitigation efforts by users and the vendor.

Potential Impact

The vulnerability allows attackers to compromise the firmware update process by injecting malicious or altered firmware that the device will trust and install. This can lead to complete device compromise, including unauthorized control, data theft, sabotage, or denial of service. For organizations relying on Unitree robotic platforms, this undermines operational security and safety, especially in sensitive environments such as research labs, manufacturing, logistics, or security applications. The ability to alter firmware without detection can facilitate persistent backdoors or espionage. Given the growing deployment of robotic systems in critical infrastructure and commercial sectors, the impact extends beyond individual devices to potentially affect entire operational workflows. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments where physical security is lax or insider threats exist. The absence of patches increases exposure duration, raising the likelihood of exploitation once attackers develop tools.

Mitigation Recommendations

Organizations should immediately enforce strict physical security controls to prevent unauthorized local access to Unitree devices and their update mechanisms. Monitoring and logging of firmware update activities should be enhanced to detect anomalies or unauthorized modifications. Until official patches or updated cryptographic implementations are released by Unitree, users should avoid applying firmware updates from untrusted sources and verify update integrity through out-of-band methods if possible. Network segmentation can limit exposure of affected devices. Engaging with Unitree to obtain security advisories and timelines for remediation is critical. Additionally, organizations should consider deploying endpoint detection and response (EDR) solutions capable of identifying unusual device behavior post-update. For high-risk environments, temporarily disabling automatic firmware updates or restricting update capabilities to trusted administrators may reduce risk. Finally, educating users about the risks of interacting with update prompts can help mitigate social engineering vectors.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
AHA
Date Reserved
2026-01-26T13:26:13.580Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a1c21f32ffcdb8a23fb748

Added to database: 2/27/2026, 4:11:11 PM

Last enriched: 2/27/2026, 4:25:25 PM

Last updated: 2/27/2026, 5:12:19 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses