{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T01:31:00.484","vulnerabilities":[{"cve":{"id":"CVE-2020-10268","sourceIdentifier":"cve@aliasrobotics.com","published":"2020-06-16T18:15:17.027","lastModified":"2024-11-21T04:55:06.133","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Critical services for operation can be terminated from windows task manager, bringing the manipulator to a halt. After this a Re-Calibration of the brakes needs to be performed. Be noted that this only can be accomplished either by a Kuka technician or by Kuka issued calibration hardware that interfaces with the manipulator furthering the delay and increasing operational costs."},{"lang":"es","value":"Los servicios críticos para la operación se pueden finalizar desde el administrador de tareas de Windows, provocando que el manipulador se detenga. Después de esto, una recalibración de los frenos se debe llevar a cabo. Tome en cuenta que esto solo puede lograrlo un técnico de Kuka o un hardware de calibración emitido por Kuka que interactúe con el manipulador, promoviendo el retraso e incrementando los costos operativos"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.9,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:P","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"cve@aliasrobotics.com","type":"Secondary","description":[{"lang":"en","value":"CWE-749"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:kuka:kr_c4_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"377A0187-FEE3-48BB-A225-30B13FBC3EF9"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:kuka:kr_c4:-:*:*:*:*:*:*:*","matchCriteriaId":"1A25F107-7654-4B4C-BA1E-4B3098AC4568"}]}]}],"references":[{"url":"https://github.com/aliasrobotics/RVD/issues/2550","source":"cve@aliasrobotics.com","tags":["Third Party Advisory"]},{"url":"https://github.com/aliasrobotics/RVD/issues/2550","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}