Aethon TUG Home Base Server
Aethon TUG Home Base Server contains multiple vulnerabilities affecting authorization (CWE-862), secure communication (CWE-300), and input handling (CWE-79). The server controls and communicates with autonomous mobile robots deployed in hospital environments. Successful exploitation could result in denial-of-service, unauthorized control of robot functions, or exposure of sensitive information. Aethon has implemented a mitigation plan focusing on firewall deployment and software updates to Version 24, but no permanent patch is available for all instances.
- Network access to the TUG Home Base Server (direct or through compromised hospital network)
- No authentication required for exploitation of the authorization vulnerabilities
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a787fe35-bf2d-4205-89d9-558ad4657b96Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.