SHARE
Facebook X Pinterest WhatsApp

Industrial Cobots Are a Different Kind IoT Security Threat

IOActive researchers say they have discovered nearly 50 critical security issues in industrial cobots, adding ‘they can end up seriously hurting a person.’

Written By
thumbnail
Sue Walsh
Sue Walsh
Aug 22, 2017

Robot arm in a factoryResearchers at IOActive report they have discovered over 50 security vulnerabilities in industrial collaborative robots, or cobots. These are machines that work with people in a variety of settings, and if compromised by a remote hacker, could possibly cause physical harm to them. They could also conceivably be programmed to spy on their surroundings and send data to a remote server, creating a new kind of industrial sabotage.

The researchers, Cesar Cerrudo and Lucas Apa, wrote in a blog post that the industrial cobots can be remotely tampered with to remove safety configurations that prevent them from operating outside of designated safety boundaries and that protocols are not in place. They began their research in February and published a paper today that complements it.

[ Related: 7 Ways to Secure Your Internet of Things ]  

These industrial cobots are different than traditional robots where they are in a fixed place doing repetitive work,” Cerrudo said. “These new collaborative robots are smarter and can do a lot of different things. There the threat is different. Once they are hacked, they have a lot of people around them; you’re talking about really powerful robots that can lift a lot of weight. It’s very possible they can end up seriously hurting a person.”

Cobot vendors don’t protect against common problems

Cerrudo and Apa studied publicly available firmware and software and how the machines work, connect to local networks, other robots and their respective vendors including cloud-based update systems. They found numerous security issues.

“Most of the [vendors] did not protect against these common problems,” Apa said, “We found a range of vulnerabilities, such as insecure communication, authentication problems, cryptographic issues and more. Some of these vulnerabilities were very easy to exploit.”

The robots studied came from vendors such as Rethink Robotics Baxter/Sawyer and Universal Robots. The researchers said they immediately notified the companies of the security issues they discovered. Baxter/Sawyer was responsive and quickly issued multiple patches to fix the vulnerabilities, which ranged from insecure authentication, insecure transport in protocols, default configurations and usage of a known vulnerable research framework. Unfortunately, Universal Robots ignored the information and has not done anything to fix their vulnerabilities, which include authentication, memory corruption and insecure communication, according to the blog post.

Apa included this YouTube video, which demonstrates the attack, in the blog:

[ Related: IoT Technologies: Developers Prefer Java, Worry About Security ]

In all, said the blog post, the researchers contacted six principal vendors in this market, with four replying. Some said they would consider fixing the vulnerabilities, while others such as SoftBank Robotics said they could not, likely because of a compatibility issue or design problem. Others such as Ubitech Robotics of China just thanked the researchers for their notification.

 

 

thumbnail
Sue Walsh

Sue Walsh is News Writer for RTInsights, and a freelance writer and social media manager living in New York City. Her specialties include tech, security and e-commerce. You can follow her on Twitter at @girlfridaygeek.

Recommended for you...

Open Source Talent Shortage Expected To Increase in 2022
David Curry
Jul 12, 2022
Volvo Puts IoT and AI in the Driver’s Seat for Vehicle Connectivity
Sue Walsh
Nov 6, 2020
Cybersecurity and Digital Trust Companies Team for IoT Threats Detection
Sue Walsh
Oct 12, 2020
Cornell Researchers Create the Country’s First Statewide IoT Network
Sue Walsh
Oct 9, 2020

Featured Resources from Cloud Data Insights

The Manual Migration Trap: Why 70% of Data Warehouse Modernization Projects Exceed Budget or Fail
The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.