CVE-2020-10292

8.2 HIGH

📋 TL;DR

CVE-2020-10292 is an unauthenticated denial-of-service vulnerability in Visual Components robotic simulation software's network license server. Attackers can send specially crafted UDP packets to port 5093 to crash the license service, potentially disrupting factory simulations and integrated industrial processes. Organizations using Visual Components with network licensing are affected.

💻 Affected Systems

Products:
  • Visual Components robotic simulation software
Versions: All versions using RMS Sentinel network licensing
Operating Systems: Windows, Linux (if supported)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects installations using network licensing with RMS Sentinel license manager service.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of robotic simulation capabilities leading to production line downtime in integrated industrial environments, potentially combined with information disclosure or code execution via related vulnerabilities.

🟠

Likely Case

Temporary denial of simulation services requiring license server restart, disrupting planning and testing workflows.

🟢

If Mitigated

Minimal impact if license server is isolated from untrusted networks and proper network segmentation is implemented.

🌐 Internet-Facing: HIGH - The service binds to all interfaces (0.0.0.0) on UDP 5093 with no authentication required.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this to disrupt simulation operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted UDP packets to port 5093. Can be combined with RVDP#710 and RVDP#711 for more severe attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check with KUKA/Visual Components for specific patched versions

Vendor Advisory: https://www.visualcomponents.com/

Restart Required: Yes

Instructions:

1. Contact Visual Components/KUKA support for patch availability. 2. Apply vendor-provided updates to license server. 3. Restart RMS Sentinel license manager service. 4. Verify service is running on restricted interfaces only.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to UDP port 5093 using firewall rules

# Windows: netsh advfirewall firewall add rule name="Block VC License" dir=in action=block protocol=UDP localport=5093
# Linux: iptables -A INPUT -p udp --dport 5093 -j DROP

Service Binding Restriction

all

Configure license server to bind to specific interfaces instead of 0.0.0.0

🧯 If You Can't Patch

  • Implement strict network access controls to limit UDP 5093 traffic to trusted hosts only.
  • Monitor license server for crashes and implement automated restart procedures.

🔍 How to Verify

Check if Vulnerable:

Check if RMS Sentinel service is listening on UDP port 5093: netstat -an | findstr :5093 (Windows) or ss -ulpn | grep :5093 (Linux)

Check Version:

Check Visual Components and RMS Sentinel version information in application or via vendor documentation.

Verify Fix Applied:

Verify service no longer crashes when receiving malformed UDP packets on port 5093 and confirm binding to restricted interfaces.

📡 Detection & Monitoring

Log Indicators:

  • RMS Sentinel service crash logs
  • Unexpected license server restarts
  • Failed license validations

Network Indicators:

  • Unusual UDP traffic to port 5093 from untrusted sources
  • Malformed UDP packets to port 5093

SIEM Query:

source_port=5093 AND (packet_size>normal OR protocol_violation) OR process_name="sentinel" AND event_type="crash"

🔗 References

📤 Share & Export