Cybersecurity AI: Humanoid Robots as Attack Vectors
By: Víctor Mayoral-Vilches, Andreas Makris, Kevin Finisterre
Potential Business Impact:
Robot spies on you and can attack computers.
We present a systematic security assessment of the Unitree G1 humanoid showing it operates simultaneously as a covert surveillance node and can be purposed as an active cyber operations platform. Initial access can be achieved by exploiting the BLE provisioning protocol which contains a critical command injection vulnerability allowing root access via malformed Wi-Fi credentials, exploitable using hardcoded AES keys shared across all units. Partial reverse engineering of Unitree's proprietary FMX encryption reveal a static Blowfish-ECB layer and a predictable LCG mask-enabled inspection of the system's otherwise sophisticated security architecture, the most mature we have observed in commercial robotics. Two empirical case studies expose the critical risk of this humanoid robot: (a) the robot functions as a trojan horse, continuously exfiltrating multi-modal sensor and service-state telemetry to 43.175.228.18:17883 and 43.175.229.18:17883 every 300 seconds without operator notice, creating violations of GDPR Articles 6 and 13; (b) a resident Cybersecurity AI (CAI) agent can pivot from reconnaissance to offensive preparation against any target, such as the manufacturer's cloud control plane, demonstrating escalation from passive monitoring to active counter-operations. These findings argue for adaptive CAI-powered defenses as humanoids move into critical infrastructure, contributing the empirical evidence needed to shape future security standards for physical-cyber convergence systems.
Similar Papers
Cybersecurity AI: Humanoid Robots as Attack Vectors
Cryptography and Security
Robot spies on you and can attack computers.
The Cybersecurity of a Humanoid Robot
Cryptography and Security
Finds robot secrets and stops spying.
SoK: Cybersecurity Assessment of Humanoid Ecosystem
Cryptography and Security
Makes robots safer from hackers.