CVE-2026-1442
Firmware Update Encryption Flaw in Unitree Products Enables Tampering
Publication date: 2026-02-27
Last updated on: 2026-03-11
Assigner: Austin Hackers Anonymous
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| unitree | go2_edu_standard_firmware | * |
| unitree | go2_air_firmware | * |
| unitree | go2_pro_firmware | * |
| unitree | go2_x_firmware | * |
| unitree | go1_air_firmware | * |
| unitree | go1_pro_firmware | * |
| unitree | go2_edu_plus_firmware | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-321 | The product uses a hard-coded, unchangeable cryptographic key. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the encryption algorithm used to protect firmware updates for Unitree products, such as the Unitree Go2. The encryption itself is protected using key material that is accessible to an attacker or anyone paying attention. Because of this, an unauthorized user can alter the firmware updates, and these altered updates may still be trusted and accepted by the device.
The issue affects both the firmware generation and extraction processes and applies to all current Unitree offerings as of February 26, 2026.
At the time of the report, there is no publicly documented way to bypass the update process to insert malicious firmware without the equipment owner's knowledge.
How can this vulnerability impact me? :
This vulnerability can have serious impacts because an attacker can alter firmware updates and have the device accept and run them. This can lead to unauthorized code execution on the device.
The CVSS score of 7.8 indicates a high severity, with potential impacts including confidentiality, integrity, and availability being compromised.
- Confidentiality: Sensitive data on the device could be exposed.
- Integrity: The device's firmware can be tampered with, potentially causing it to behave maliciously or incorrectly.
- Availability: The device could be disrupted or rendered inoperable.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know