web analytics

Learn AI With Kesse | Newest Trends in Artificial Intelligence

We answer questions about artificial intelligence and bring you what's new in the AI World.

Is My Unitree G1 Monitoring My Activities?

Is My Unitree G1 Spying on Me?

Security Vulnerabilities in Unitry Robots: The Remote Code Execution Issue

Greetings, everyone. Today, I’m here to discuss a rough day for Jeff the G1 and the entire fleet of Unitry robots, including the H1s, GOTs, B2s, and R1s. Recent discussions around security flaws in these robots have raised alarm bells, revealing a potential vulnerability that allows for remote code execution, affecting not just one robot, but any Unitry robot that can be accessed at close range.

Overview of the Issue

For a bit of background, this isn’t the first time security vulnerabilities have been noted in Unitry robots. A year ago, claims surfaced regarding remote tunneling, which purportedly allowed for unauthorized access from anywhere in the world. However, I found little solid evidence to support those claims, and Unitry dismissed them as overstated.

Today, I aim to provide concrete evidence about the security flaws. As we delve into this, I hope this serves as proof that can be referenced in the future whenever someone questions whether these incidents actually occurred.

What Makes the Current Situation Egregious?

Every Unitry robot features a main board that runs proprietary code, which users cannot access. This main board has Bluetooth Low Energy (BLE) turned on constantly, waiting for connections. The problem arises from hard-coded AES keys that are identical across all units. This presents a security risk since anybody with access to BLE can potentially exploit it.

Initially, users were only intended to update Wi-Fi credentials via Bluetooth. However, some discovered that manipulating these credentials allows for the injection of commands that the robot executes with root privileges. Thus, the situation escalates from poor security practice to a major vulnerability.

Demonstrating the Vulnerability

To showcase this vulnerability, I’m using a device called Unione, which is not affiliated with the manufacturer. I initially believed that the security flaw was patched, but further research proved otherwise.

To demonstrate, I powered up the G1 robot, ensuring it was offline (no Ethernet connection and the remote was switched off). The boot-up sequence began, indicating that Jeff was ready for action.

I proceeded to run a script, hack.py, which injects commands through the Wi-Fi credentials section. By leveraging this BLE vulnerability, I successfully executed a reboot command, demonstrating how easily remote code execution could occur.

The results were immediate; the robot rebooted as commanded without any direct connection via Wi-Fi or external networks. This showcases a concerning level of control that any nearby individual could exert over the robot.

Implications of Remote Code Execution

The consequences of such vulnerabilities are significant. If anyone can execute arbitrary commands on these robots, they could potentially brick them or commandeer them for malicious purposes. This is compounded by the fact that there are ongoing high-profile robot conventions where demonstration robots are utilized.

Unitry’s response to these claims has been inadequate, reiterating that their products are designed for offline use. However, this contradicts the facts; the first setup step for the G1 involves connecting to an app that requires internet access to update Wi-Fi credentials. Thus, their assertion that robots don’t need to connect to the internet is misleading.

Addressing Persistent Telemetry Issues

Another point of contention lies in the claims around persistent telemetry, which suggest that robots continually send data back to the manufacturer. Unitry acknowledged user concerns but has not satisfactorily addressed the underlying issues leading to remote code execution.

The telemetry claims raised legitimate concerns about user privacy and data security. While telemetry is a common feature in many consumer electronics, it must be opt-in with clear user consent and transparency about what data is collected.

Moving Forward

As a concerned consumer and observer of this situation, I’m looking ahead to future developments. I’ve pre-ordered a robot from Kscale, a competitor, and it promises to be truly open-source, offering transparency and access to the code, which I believe is essential in today’s climate.

Unitry is at a crossroads, trying to balance proprietary technology with the glaring security flaws that could tarnish their reputation. They need to address these vulnerabilities and regain users’ trust, not just to protect their products but to ensure user safety.

Conclusion

It’s disheartening to see issues like this emerge in a once-promising platform. As new data comes to light, it’s crucial to hold companies accountable while advocating for more secure, open-source alternatives. If you’re a Unitry robot owner, staying informed and cautious is essential in navigating these vulnerabilities. As we proceed, the onus remains on manufacturers to deliver on their promises of security and transparency.



#Unitree #Spying
Thanks for reaching. Please let us know your thoughts and ideas in the comment section.

Source link

About The Author

31 thoughts on “Is My Unitree G1 Monitoring My Activities?

  1. This is literally the plot to Atomic Heart btw if you think it's intentional which likely not but still

    1. USSR or China in this case makes a bunch of cheap robots
    2. Sells them to west and they buy them for some reason and for some reason puts them near important stuff
    3. Have plan to execute order 66 on them <– You are here
    4. Brain inplants same idea
    5. Some random person goes rogue and executes order 66
    6. Choas and pandemonium

  2. people are going to spin this as "nefarious Chinese company beholden to the CCP is spying on us" when actually it's just cybersecurity incompetence. I work with hardware security, I've hacked on several IOT devices. These types of bugs appear on products from American companies all the time and no drama is created regarding "NSA hacked all Kindles" or whatever. It's just part of the reality of putting internet in everything and especially prevalent when a company does not value cybersecurity of the products they ship. Unitree definitely needs to step up their game. Regarding the "exfiltrated data", there's absolutely nothing out of the usual about the data they are sending to their servers. Very innocuous and even very mild compared to some of the data other companies (American companies) gather and send from their devices.

  3. answering your points. 15:20 "how can they update this" "anyone can MITM your device becuase the AES keys are hardcoded". An OTA (over the air) firmware update should fix this. Both by them not using hardcoded AES keys anymore and also fixing the incredible command injection over BLE. 19:20 I don't see the problem with their justification. You are connecting the robot to the web (via your adhoc network). As they state it's not a necessary function for the robot to connect ot the internet; but yes it will send telemetry when it IS connected. EVERY device does this, your Kindle does it, you phones do it, etc. I haven't hacked the Unitree but have hacked other IOT devices like I mention on my previous comment. And from the data mentioned on the paper, Unitree is actually very, very tame in terms of data collection. I guarantee your e-book reader, or your Windows, is capturing more data than that. 34:56 you can't tell because it's encrypted data (TLS). at least here they are using good practice and using TLS. 35:35 could be stuff like just acknowledgements (as you suggested), could be an update to adress lists, replies to requests from the robot (like queries about any existing firmware updates available), etc.

  4. Now you can see why my comment a few weeks back about you interacting with this robot with those swords in your back was not so much of a joke. You are an early adopter of extremely capable, on-the-air receiving commands/updates, made-in-china tech being put in production as soon as possible due to internal competition there.
    A lot can go wrong. Be extremely cautious, Harrison. We cannot afford to lose you!

  5. I would definitely consider disconnecting the Bluetooth module now that this is in the open. The telemetry could be just debug data accidentally left in but…. Stil very worrying.

  6. do you remember when new iphone was hacked time and time again? it will take some time to patch all the vulnerabilities. there are probably much more to discover. by the way, i miss charles so badly. mucho more fun than this robot. i know charles wont make it into the future as this robot will but it just was so fun … connta talk to my pillow….

  7. Unlike a phone or PC the robot could actually physically harm you. Having closed off firmware is unacceptable, it must be open source, if you can't audit or patch the robot, you don't own it. I really hope to see K-Scale labs grow, Unitree is not a safe platform to build on.

  8. Were I a G1 owner, I'd do the following:
    1 Create a sort of preflight procedure to run through on initial setup, and after each software, firmware, or hardware update. This would detect and identify all connections, wired or wireless, and attempt to identify exactly what data is being transmitted to or from the device.
    2 Create a separate but similar procedure to go through at the start of each development session.
    3 I'd take steps to non-destructively disable BT on the device, and perhaps WiFi too unless I need it for something.
    4 I'd disable BT on all other devices within connection range of the robot for now. Or if that wasn't practical then I'd move the robot to a workspace out of range of all the other devices.

  9. All this stuff with robots and AI is developing so fast that companies make a lot of mistakes. Everybody has so much FOMO that they willingly release PoCs and development previews as products. Its so dangerous 😬.
    Its not AI that will destroy us, its the greed and impatience of humans.

  10. So if I understand this right, anyone that's nearby can use an always-on bluetooth to change the wifi credentials, which in turn means that:

    1a) they can also inject / execute arbitrary shell code (as root) due to a security vulnerability caused by no input sanitizing

    1b) they can force it to connect to their own network / access point (e.g. mobile hotspot, portable router, etc)

    2) when the connection to said wifi happens, some data (likely telemetry) is emitted to some remote server, and from the server

    3) not much can be done, since the whole system is tightly closed down (😢), and any updates can also be man-in-the-middle'd

    And the company is downplaying & ignoring at least some of the above. Sounds like a great proposition! /s

Leave a Reply

Your email address will not be published. Required fields are marked *

We use cookies to personalize content and ads and to primarily analyze our geo traffic sources. We also may share information about your use of our site with our social media, advertising, and analytics partners to improve your user experience. We respect your privacy and will never abuse your information. [ Privacy Policy ] View more
Cookies settings
Accept
Decline
Privacy & Cookie Policy
Privacy & Cookies policy
Cookie name Active

The content on this page governs our Privacy Policy. It describes how your personal information is collected, used, and shared when you visit or make a purchase from learnaiwithkesse.com (the "Site").

Kesseswebsites and Advertising owns Learn AI With Kesse and the website learnaiwithkesse.wiki. For the purpose of this Terms and Agreements [ we, us, I, our ] represents the owner of Learning AI With Kesse which is Kesseswebsites and Advertising. [ You, your, student and buyer ] represents you as the user and visitor of this site. Terms of Conditions, Terms of Service, Terms and Agreement and Terms of use shall be considered the same here. This website or site refers to https://learnaiwithkesse.com. You agree that the content of this Terms and Agreement may include Privacy Policy and Refund Policy. Products refer to physical or digital products. This includes eBooks, PDFs, and text or video courses. If there is anything on this page you do not understand you agree to reach out to us via email [ emmanuel@learnaiwithkesse.com ] for explanation before using any part of this site.

1. Personal Information We Collect

When you visit this Site, we automatically collect certain information about your device, including information about your web browser, IP address, time zone, and some of the cookies that are installed on your device. The primary purpose of this activity is to provide you a better user experience the next time you visit our again and also the data collection is for analytics study. Additionally, as you browse the Site, we collect information about the individual web pages or products that you view, what websites or search terms referred you to the Site, and information about how you interact with the Site. We refer to this automatically-collected information as "Device Information."

We collect Device Information using the following technologies:

"Cookies" are data files that are placed on your device or computer and often include an anonymous unique identifier. For more information about cookies, and how to disable cookies, visit http://www.allaboutcookies.org. To comply with European Union's GDPR (General Data Protection Regulation), we do display a disclaimer a consent text at the bottom of this website. This disclaimer alerts you the visitor or user of this website about why we use cookies, and we also give you the option to accept or decline. If you accept for us to use cookies on your site, the agreement between you and us will expire after 180 has passed.

"Log files" track actions occurring on the Site, and collect data including your IP address, browser type, Internet service provider, referring/exit pages, and date/time stamps.

"Web beacons," "tags," and "pixels" are electronic files used to record information about how you browse the Site.

Additionally, when you make a purchase or attempt to make a purchase through the Site, we collect certain information from you, including your name, billing address, shipping address, payment information (including credit card numbers), email address, and phone number. We refer to this information as "Order Information."

When we talk about "Personal Information" in this Privacy Policy, we are talking both about Device Information and Order Information.

Payment Information

Please note that we use 3rd party payment processing companies like https://stripe.com and https://paypal.com to process your payment information. PayPal and Stripe protects your data according to their terms and agreement and may store your data to help make your subsequent transactions on this website easier. We never and [ DO NOT ] store your card information or payment login information on our website or server. By making payment on our site, you agree to abide by the Terms and Agreement of the 3rd Party payment processing companies we use. You can visit their websites to read their Terms of Use and learn more about them.

2. How Do We Use Your Personal Information?

We use the Order Information that we collect generally to fulfill any orders placed through the Site (including processing your payment information, arranging for shipping, and providing you with invoices and/or order confirmations). Additionally, we use this [a] Order Information to:

[b] Communicate with you;

[c] Screen our orders for potential risk or fraud; and

When in line with the preferences you have shared with us, provide you with information or advertising relating to our products or services. We use the Device Information that we collect to help us screen for potential risk and fraud (in particular, your IP address), and more generally to improve and optimize our Site (for example, by generating analytics about how our customers browse and interact with the Site, and to assess the success of our marketing and advertising campaigns).

3. Sharing Your Personal Information

We share your Personal Information with third parties to help us use your Personal Information, as described above. For example, we use System.io to power our online store--you can read more about how Systeme.io uses your Personal Information here: https://systeme.io/privacy-policy/ . We may also use Google Analytics to help us understand how our customers use the Site--you can read more about how Google uses your Personal Information here: https://www.google.com/intl/en/policies/privacy/. You can also opt-out of Google Analytics here: https://tools.google.com/dlpage/gaoptout.

Finally, we may also share your Personal Information to comply with applicable laws and regulations, to respond to a subpoena, search warrant or other lawful request for information we receive, or to otherwise protect our rights.

4. Behavioral Advertising

As described above, we use your Personal Information to provide you with targeted advertisements or marketing communications we believe may be of interest to you. For more information about how targeted advertising works, you can visit the Network Advertising Initiative’s (“NAI”) educational page at http://www.networkadvertising.org/understanding-online-advertising/how-does-it-work.

You can opt-out of targeted advertising by:

COMMON LINKS INCLUDE:

FACEBOOK - https://www.facebook.com/settings/?tab=ads

GOOGLE - https://www.google.com/settings/ads/anonymous

BING - https://advertise.bingads.microsoft.com/en-us/resources/policies/personalized-ads]

Additionally, you can opt-out of some of these services by visiting the Digital Advertising Alliance’s opt-out portal at: http://optout.aboutads.info/.

5. Data Retention

Besides your card payment and payment login information, when you place an order through the Site, we will maintain your Order Information for our records unless and until you ask us to delete this information. Example of such information include your first name, last name, email and phone number.

6. Changes

We may update this privacy policy from time to time in order to reflect, for example, changes to our practices or for other operational, legal or regulatory reasons.

7. Contact Us

For more information about our privacy practices, if you have questions, or if you would like to make a complaint, please contact us by e-mail at emmanuel@learnaiwithkesse.com or by mail using the details provided below:

8. Your acceptance of these terms

By using this Site, you signify your acceptance of this policy. If you do not agree to this policy, please do not use our Site. Your continued use of the Site following the posting of changes to this policy will be deemed your acceptance of those changes.

Last Update | 18th August 2024

Save settings
Cookies settings