CVE-2026-8153: Critical OS Command Injection Vulnerability in Universal Robots PolyScope 5 Exposes Industrial Robot Fleets to Remote Hacking

CVE-2026-8153: Critical OS Command Injection Vulnerability in Universal Robots PolyScope 5 Exposes Industrial Robot Fleets to Remote Hacking

Executive Summary

A critical security vulnerability, designated CVE-2026-8153, has been discovered in the Universal Robots PolyScope 5 platform, specifically within the Dashboard Server interface. This flaw enables unauthenticated remote attackers to execute arbitrary operating system commands on affected industrial robots, thereby exposing entire robot fleets to potential compromise. The vulnerability is classified as OS Command Injection (CWE-78), carries a CVSS v3.1 base score of 9.8 (Critical), and affects all PolyScope 5 versions prior to 5.25.1. The attack vector is network-based and requires no authentication, making exploitation trivial for any adversary with network access to the robot’s management interface. The risk is particularly acute for organizations in manufacturing and industrial automation sectors, where disruption or manipulation of robotic systems can have severe operational and safety consequences.

Technical Information

The vulnerability CVE-2026-8153 resides in the Dashboard Server component of Universal Robots PolyScope 5, which listens by default on TCP port 29999. The Dashboard Server is designed to facilitate remote control and management of robot operations via TCP/IP. However, due to insufficient input validation and sanitization, the server is susceptible to OS command injection. An attacker can craft and transmit malicious payloads to the Dashboard Server, which are then executed with the privileges of the underlying operating system user.

The vulnerability is characterized by the following technical attributes: it is remotely exploitable over the network, requires no authentication or user interaction, and can be triggered by sending specially crafted commands to the Dashboard Server’s TCP socket. The attack leverages improper handling of input data, allowing arbitrary shell commands to be injected and executed. This can result in full system compromise, including the ability to manipulate robot behavior, exfiltrate sensitive data, disrupt manufacturing processes, or pivot laterally within the industrial network.

The CVSS v3.1 vector string for this vulnerability is AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, reflecting its high impact on confidentiality, integrity, and availability. The vulnerability is mapped to MITRE ATT&CK techniques T1210 (Exploitation of Remote Services) and T1059 (Command and Scripting Interpreter), under the Initial Access and Execution tactics.

Indicators of compromise include unauthorized or anomalous connections to TCP port 29999, unexpected command sequences or malformed input in Dashboard Server logs, the presence of unfamiliar processes or files on the robot’s operating system, and unexplained changes to robot programs or configurations.

Exploitation in the Wild

As of the latest available intelligence, there are no confirmed public reports of exploitation of CVE-2026-8153 in the wild. No proof-of-concept exploit code has been published in open sources, and no specific threat actors or advanced persistent threat (APT) groups have been publicly linked to active exploitation of this vulnerability. Nevertheless, the trivial nature of the attack—requiring only network access and no authentication—renders it highly attractive to both opportunistic and targeted adversaries. The vulnerability’s exposure surface is significant in environments where robot management interfaces are accessible from less trusted networks or the internet.

Given the criticality and ease of exploitation, it is reasonable to anticipate that threat actors, including those with industrial espionage or sabotage motives, may seek to weaponize this vulnerability in the near future. Organizations operating industrial automation and manufacturing systems should assume that exploitation attempts are imminent and act with urgency to mitigate risk.

APT Groups using this vulnerability

At the time of this report, there is no public attribution of CVE-2026-8153 exploitation to any known APT group or cybercriminal organization. No sector-specific or country-specific targeting has been observed in open-source intelligence. However, the vulnerability’s characteristics align with the tactics, techniques, and procedures (TTPs) commonly employed by APT groups targeting operational technology (OT) and industrial control systems (ICS). The lack of authentication and remote exploitability make it a prime candidate for inclusion in the toolkits of threat actors seeking to disrupt or manipulate industrial environments.

Affected Product Versions

The vulnerability affects all versions of Universal Robots PolyScope 5 prior to version 5.25.1. Specifically, any deployment running a release earlier than 5.25.1 is vulnerable to unauthenticated OS command injection via the Dashboard Server interface. The only currently available mitigation is to upgrade to PolyScope 5.25.1 or later, as this version includes the necessary security patch to remediate the flaw.

Workaround and Mitigation

Immediate action is required to mitigate the risk posed by CVE-2026-8153. Organizations should upgrade all instances of Universal Robots PolyScope 5 to version 5.25.1 or later without delay. In addition to patching, it is critical to restrict network access to the Dashboard Server’s TCP port 29999. Only trusted management hosts should be permitted to communicate with the robot controllers on this port, and access should be tightly controlled using network segmentation, firewalls, and access control lists.

Continuous monitoring of network traffic for unauthorized or anomalous connections to TCP port 29999 is recommended. Security teams should review Dashboard Server logs for evidence of unexpected command sequences or malformed input, and inspect robot operating systems for unfamiliar processes, files, or configuration changes. Where possible, implement intrusion detection and prevention systems (IDS/IPS) tailored to industrial protocols and robot management interfaces.

No effective workaround exists other than patching and network isolation. Disabling the Dashboard Server or removing network connectivity may be considered as a temporary emergency measure in environments where immediate patching is not feasible, but this may impact operational continuity.

References

NVD CVE-2026-8153, Universal Robots Dashboard Server Documentation, SecurityWeek Article, BackBox News, MITRE ATT&CK T1210, MITRE ATT&CK T1059

Rescana is here for you

At Rescana, we understand the critical importance of securing your operational technology and supply chain ecosystem. Our Third-Party Risk Management (TPRM) platform empowers organizations to continuously monitor, assess, and mitigate cyber risks across their vendor landscape, providing actionable intelligence and automated workflows to strengthen your security posture. If you have any questions about this advisory or require assistance in evaluating your exposure to emerging threats, our team is ready to help. Please contact us at ops@rescana.com.