Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

912+ Articles
122+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-8153: Universal Robots PolyScope OS Command Injection — Unauthenticated RCE on Industrial Robots
CVE-2026-8153: Universal Robots PolyScope OS Command Injection — Unauthenticated RCE on Industrial Robots

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-8153

CVE-2026-8153: Universal Robots PolyScope OS Command Injection — Unauthenticated RCE on Industrial Robots

A critical OS command injection flaw in Universal Robots PolyScope Dashboard Server (CVSS 9.8) allows unauthenticated attackers to execute arbitrary commands on the robot's operating system via crafted network requests.

Dylan H.

Security Team

May 9, 2026
6 min read

Affected Products

  • Universal Robots PolyScope versions prior to 5.21.1

CVE-2026-8153: Universal Robots PolyScope OS Command Injection

A critical OS command injection vulnerability tracked as CVE-2026-8153 has been disclosed in Universal Robots PolyScope, the software platform used to program and control Universal Robots collaborative robot arms (cobots). The flaw resides in the Dashboard Server interface and enables an unauthenticated remote attacker to craft commands that execute arbitrary code on the robot's underlying operating system.

The vulnerability was published on May 8, 2026, assigned a CVSS v3.1 score of 9.8 (Critical), and affects all PolyScope versions prior to 5.21.1. Universal Robots has released a patched version addressing the issue.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-8153
CVSS Score9.8 (Critical)
CWE ClassificationCWE-78 — Improper Neutralization of Special Elements used in an OS Command
Affected ComponentDashboard Server interface in PolyScope
Attack VectorNetwork
Authentication RequiredNone (unauthenticated)
User InteractionNone
Primary ImpactArbitrary OS command execution on robot controller
Fixed VersionPolyScope 5.21.1 and later

Affected Products

ProductAffected Versions
Universal Robots PolyScopeAll versions prior to 5.21.1
UR3, UR5, UR10, UR16 cobotsWhen running affected PolyScope versions
UR e-Series controllersWhen running affected PolyScope versions

Technical Details

What Is the PolyScope Dashboard Server?

The Dashboard Server is a TCP-based interface exposed by PolyScope that allows external tools, integration software, and scripts to query and control robot operations programmatically. It is used for tasks such as loading programs, querying robot state, and triggering operational modes. The interface operates without authentication in many default configurations, making it reachable by any device on the same network segment.

Root Cause

The Dashboard Server fails to sanitize attacker-controlled input before passing it to an underlying OS command interpreter. An attacker can craft a specially formatted request that injects shell metacharacters into parameters processed by the server, causing the robot controller's operating system to execute the injected commands.

Because the service runs with elevated privileges on the embedded Linux system powering the robot controller, successful exploitation grants the attacker full OS-level access to the controller.

Exploitation Path

Attacker (network access, no credentials required)
  → Sends crafted Dashboard Server request
    → Malicious input reaches OS command interpreter unsanitized
      → Injected commands execute on robot controller OS
        → Full OS-level control of the robot arm

The attack requires only network access to the robot controller. Universal Robots cobots deployed in manufacturing floors, warehouses, laboratories, or research facilities with inadequate network segmentation are directly exposed.


Impact Assessment

Impact AreaDescription
Physical SafetyAttacker can issue arbitrary movement commands, potentially causing physical harm to nearby personnel or equipment
Industrial Process DisruptionRobot programs can be stopped, modified, or replaced — halting production lines
Persistent CompromiseOS access allows implanting persistent malware or backdoors on the robot controller
Lateral MovementCompromised robot controllers can serve as pivot points within OT/IT networks
Data ExfiltrationProprietary robot programs and operational data can be stolen
Ransomware TargetCritical manufacturing infrastructure makes these systems valuable ransomware targets

The CVSS 9.8 rating reflects the combination of no authentication, no user interaction, full impact on confidentiality/integrity/availability, and the safety implications unique to industrial robotic systems.


Remediation

Immediate Action: Update PolyScope

Upgrade to PolyScope 5.21.1 or later. Universal Robots has released this version to address CVE-2026-8153. Update procedures vary by controller generation:

  • e-Series controllers: Updates can be applied via USB stick or through the PolyScope web interface under System → Software Update
  • CB-Series controllers: Contact Universal Robots or your system integrator for firmware update instructions

Network Segmentation (Defense in Depth)

Regardless of patch status, robot controllers should never be directly exposed to untrusted networks:

  1. Isolate robot controllers on a dedicated OT/ICS VLAN separated from corporate IT networks
  2. Implement firewall rules blocking inbound connections to the Dashboard Server port (default TCP 29999) from untrusted hosts
  3. Disable remote Dashboard Server access if programmatic external access is not required for your deployment
  4. Monitor for unexpected network connections to robot controller IP addresses

Interim Mitigation (If Patching Is Delayed)

If immediate patching is not possible:

# On the robot controller (requires existing OS access):
# Block Dashboard Server port at the host firewall
iptables -A INPUT -p tcp --dport 29999 ! -s <trusted_ip_range> -j DROP

Context: OT/ICS Security and Collaborative Robots

Universal Robots cobots are among the most widely deployed collaborative robots globally, found across automotive manufacturing, electronics assembly, food production, pharmaceutical manufacturing, and logistics. The convergence of IT and OT networks — driven by Industry 4.0 initiatives — has increasingly exposed historically air-gapped robot controllers to network-accessible attack surfaces.

This vulnerability class (unauthenticated OS command injection in network-exposed industrial control interfaces) represents one of the most severe risk categories in OT security. Unlike IT systems, compromised industrial robots carry physical safety implications beyond data loss, including potential harm to human workers sharing the same workspace.

Organizations operating Universal Robots deployments should treat this advisory as high urgency, particularly in facilities where:

  • Robots operate in close proximity to personnel (human-robot collaboration)
  • Robot controllers are connected to plant-wide networks with limited segmentation
  • Remote monitoring or integration software requires Dashboard Server access

Key Takeaways

  1. CVE-2026-8153 is a CVSS 9.8 critical OS command injection in Universal Robots PolyScope Dashboard Server — exploitable with no authentication
  2. All PolyScope versions prior to 5.21.1 are affected; patch to 5.21.1 immediately
  3. The attack is network-accessible with zero authentication required — no user interaction needed
  4. Physical safety implications elevate urgency beyond typical IT vulnerabilities
  5. Network segmentation is essential regardless of patch status — robot controllers must not be reachable from untrusted networks
  6. Facilities with Industry 4.0 IT/OT convergence deployments should audit all robot controller network exposure

Sources

  • CVE-2026-8153 — NIST NVD
  • Universal Robots PolyScope Documentation
#CVE-2026-8153#Universal Robots#PolyScope#OS Command Injection#CWE-78#OT/ICS#Robotics#Unauthenticated RCE#Industrial Security#Critical Infrastructure

Related Articles

CVE-2026-1579: MAVLink Protocol Unauthenticated Shell Access

A critical CVSS 9.8 vulnerability in the MAVLink drone communication protocol allows unauthenticated attackers to send arbitrary SERIAL_CONTROL commands —...

6 min read

CVE-2026-30303 — Axon Code OS Command Injection via Whitelist Bypass

The command auto-approval module in Axon Code contains an OS Command Injection vulnerability. An incompatible Unix-based shell-quote parser is used on...

5 min read

CVE-2026-33478: AVideo CloneSite Plugin Unauthenticated RCE (CVSS 10.0)

A critical chain of vulnerabilities in WWBN AVideo's CloneSite plugin allows fully unauthenticated attackers to achieve remote code execution via key...

4 min read
Back to all Security Alerts