FKIE_CVE-2026-32743
Vulnerability from fkie_nvd - Published: 2026-03-19 00:16 - Updated: 2026-03-19 18:00
Severity ?
Summary
PX4 is an open-source autopilot stack for drones and unmanned vehicles. Versions 1.17.0-rc2 and below are vulnerable to Stack-based Buffer Overflow through the MavlinkLogHandler, and are triggered via MAVLink log request. The LogEntry.filepath buffer is 60 bytes, but the sscanf function parses paths from the log list file with no width specifier, allowing a path longer than 60 characters to overflow the buffer. An attacker with MAVLink link access can trigger this by first creating deeply nested directories via MAVLink FTP, then requesting the log list. The flight controller MAVLink task crashes, losing telemetry and command capability and causing DoS. This issue has been fixed in this commit: https://github.com/PX4/PX4-Autopilot/commit/616b25a280e229c24d5cf12a03dbf248df89c474.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| dronecode | px4_drone_autopilot | * | |
| dronecode | px4_drone_autopilot | 1.17.0 | |
| dronecode | px4_drone_autopilot | 1.17.0 | |
| dronecode | px4_drone_autopilot | 1.17.0 | |
| dronecode | px4_drone_autopilot | 1.17.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dronecode:px4_drone_autopilot:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2FC2D6F1-D77D-44C2-A99C-55CB5A4474B9",
"versionEndExcluding": "1.17.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dronecode:px4_drone_autopilot:1.17.0:alpha1:*:*:*:*:*:*",
"matchCriteriaId": "033A0A82-2986-44D5-A712-47B8D43407FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dronecode:px4_drone_autopilot:1.17.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "3F2EA96E-BC3A-42AB-B81B-53D5872B2296",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dronecode:px4_drone_autopilot:1.17.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1EAC5320-8D94-477D-AB85-144F8218DDFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dronecode:px4_drone_autopilot:1.17.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "667B60ED-8278-424A-BC6E-3E6EAB5A5399",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PX4 is an open-source autopilot stack for drones and unmanned vehicles. Versions 1.17.0-rc2 and below are vulnerable to Stack-based Buffer Overflow through the MavlinkLogHandler, and are triggered via MAVLink log request. The LogEntry.filepath buffer is 60 bytes, but the sscanf function parses paths from the log list file with no width specifier, allowing a path longer than 60 characters to overflow the buffer. An attacker with MAVLink link access can trigger this by first creating deeply nested directories via MAVLink FTP, then requesting the log list. The flight controller MAVLink task crashes, losing telemetry and command capability and causing DoS. This issue has been fixed in this commit: https://github.com/PX4/PX4-Autopilot/commit/616b25a280e229c24d5cf12a03dbf248df89c474."
},
{
"lang": "es",
"value": "PX4 es una pila de piloto autom\u00e1tico de c\u00f3digo abierto para drones y veh\u00edculos no tripulados. Las versiones 1.17.0-rc2 e inferiores son vulnerables a un desbordamiento de b\u00fafer basado en pila a trav\u00e9s del MavlinkLogHandler, y se activan mediante una solicitud de registro MAVLink. El b\u00fafer LogEntry.filepath es de 60 bytes, pero la funci\u00f3n sscanf analiza rutas del archivo de lista de registros sin un especificador de ancho, permitiendo que una ruta de m\u00e1s de 60 caracteres desborde el b\u00fafer. Un atacante con acceso al enlace MAVLink puede activar esto creando primero directorios profundamente anidados a trav\u00e9s de MAVLink FTP, y luego solicitando la lista de registros. La tarea MAVLink del controlador de vuelo falla, perdiendo la capacidad de telemetr\u00eda y comando y causando DoS. Este problema ha sido solucionado en este commit: https://github.com/PX4/PX4-Autopilot/commit/616b25a280e229c24d5cf12a03dbf248df89c474."
}
],
"id": "CVE-2026-32743",
"lastModified": "2026-03-19T18:00:32.280",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2026-03-19T00:16:18.177",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/PX4/PX4-Autopilot/commit/616b25a280e229c24d5cf12a03dbf248df89c474"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Mitigation",
"Vendor Advisory"
],
"url": "https://github.com/PX4/PX4-Autopilot/security/advisories/GHSA-97c4-68r9-96p5"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-121"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…