CVE-2025-60251

5.0 MEDIUM

📋 TL;DR

This vulnerability allows authentication bypass on Unitree Go2, G1, H1, and B2 robots by accepting any handshake secret containing the substring 'unitree'. This affects all users of these robot models with firmware through September 20, 2025.

💻 Affected Systems

Products:
  • Unitree Go2
  • Unitree G1
  • Unitree H1
  • Unitree B2
Versions: All versions through 2025-09-20
Operating Systems: Robot-specific firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with default authentication mechanisms are vulnerable until patched.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could gain unauthorized control of the robot, potentially causing physical harm, property damage, or data exfiltration from connected systems.

🟠

Likely Case

Unauthorized access to robot functions, manipulation of movement/operations, or disabling of safety features without proper authentication.

🟢

If Mitigated

Limited impact if robots operate in isolated networks with strict access controls and physical security measures.

🌐 Internet-Facing: HIGH if robots are directly exposed to the internet, as authentication can be bypassed without credentials.
🏢 Internal Only: MEDIUM as attackers with network access could still exploit the vulnerability to control robots.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: YES
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The UniPwn tool demonstrates exploitation requiring only network access to the robot's authentication endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware after 2025-09-20

Vendor Advisory: Not publicly available

Restart Required: Yes

Instructions:

1. Contact Unitree support for updated firmware. 2. Apply firmware update via official update mechanism. 3. Verify authentication now requires proper secret validation.

🔧 Temporary Workarounds

Network segmentation

all

Isolate robots on separate VLANs with strict firewall rules to limit access.

Disable remote authentication

all

Disable network authentication features if not required for operation.

🧯 If You Can't Patch

  • Physically disconnect robots from networks when not in active use
  • Implement strict physical access controls to prevent unauthorized network connections

🔍 How to Verify

Check if Vulnerable:

Attempt authentication with any secret containing 'unitree' substring to the robot's authentication endpoint.

Check Version:

Check firmware version via robot's admin interface or Unitree control software.

Verify Fix Applied:

Verify that authentication now fails with invalid secrets and requires proper validation.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts with 'unitree' in secret
  • Successful authentications from unexpected IPs

Network Indicators:

  • Authentication requests to robot endpoints from unauthorized sources
  • Unusual command traffic following authentication

SIEM Query:

source_ip OUTSIDE allowed_range AND dest_port IN [robot_auth_ports] AND payload CONTAINS 'unitree'

🔗 References

📤 Share & Export