Description
Since the encryption algorithm used to protect firmware updates is itself encrypted using key material available to an attacker (or anyone paying attention), the firmware updates may be altered by an unauthorized user, and then trusted by a Unitree product, such as the Unitree Go2 and other models. This issue appears to affect all of Unitree’s current offerings as of February 26, 2026, and so should be considered a vulnerability in both the firmware generation and extraction processes. At the time of this release, there is no publicly-documented mechanism to subvert the update process and insert poisoned firmware packages without the equipment owner’s knowledge.
References (4)
Scores
CVSS v3
7.8
EPSS
0.0001
EPSS Percentile
0.9%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-321
Status
published
Products (7)
unitree/go1_air_firmware
unitree/go1_pro_firmware
unitree/go2_air_firmware
unitree/go2_edu_plus_firmware
unitree/go2_edu_standard_firmware
unitree/go2_pro_firmware
unitree/go2_x_firmware
Published
Feb 27, 2026
Tracked Since
Feb 27, 2026