Critical Security Flaw in Ghost Robotics Vision 60: CVE-2025-41108

Critical Security Flaw in Ghost Robotics Vision 60: CVE-2025-41108



A recently disclosed vulnerability, CVE-2025-41108 (EUVD-2025-35344), affects the Ghost Robotics Vision 60 platform.


🔍 What Is This Vulnerability?

The vulnerability was discovered in the Ghost Robotics Vision 60, a quadruped robot widely used in military, security, and harsh-terrain operations. Analysis shows that the device’s firmware version v0.27.2 lacks a proper authentication mechanism.

Because of this deficiency, an attacker within range of the robot’s network can remotely connect and send commands to the device. In short: if an attacker can access the same network or intercept the robot’s communication, they may be able to take control of the robot.

Vision 60 is often deployed for autonomous patrols, surveillance, and security checkpoints. Losing control of such a system is not only a digital incident but a physical security risk as well.

The flaw lies in the implementation of the MAVLink protocol used for communication between the robot and its controller. While MAVLink is a common telemetry/command protocol for autonomous vehicles, the implementation here is missing encryption and authentication. That allows an attacker to forge or replay communication packets to deceive the robot.


Technical Summary

  • Vulnerability ID: CVE-2025-41108 / EUVD-2025-35344

  • Affected product: Ghost Robotics Vision 60 v0.27.2

  • Vulnerability type: Improper Authentication (CWE-287)

  • CVSS score: 9.2 — Critical

  • Impact: Remote command execution, full system takeover


Potential Consequences

Depending on the deployment scenario, this vulnerability can have various severe impacts:

  • Military deployments: Mission sabotage through false commands or diversion.

  • Security operations: Manipulation of camera and sensor feeds, undermining situational awareness.

  • Industrial use: Disruption of autonomous transport or inspection tasks, causing downtime or physical damage.


Aurora_Feniks

I have extensive experience working on various projects within the IT field, which has provided me with a comprehensive understanding of all areas related to information technology. My expertise in cyber security and my hands-on experience with current scenarios have given me a well-rounded perspective on security issues.

Post a Comment

Hello, share your thoughts with us.

Previous Post Next Post

İletişim Formu