Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25196: n/a

0
Low
VulnerabilityCVE-2024-25196cvecve-2024-25196
Published: Tue Feb 20 2024 (02/20/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Open Robotics Robotic Operating Sytstem 2 (ROS2) and Nav2 humble versions were discovered to contain a buffer overflow via the nav2_controller process. This vulnerability is triggerd via sending a crafted .yaml file.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:31:22 UTC

Technical Analysis

CVE-2024-25196 identifies a buffer overflow vulnerability in the nav2_controller process of Open Robotics' Robotic Operating System 2 (ROS2) and Nav2 humble versions. The vulnerability arises when the nav2_controller parses a crafted .yaml configuration file, leading to an out-of-bounds write condition (CWE-120). This buffer overflow can cause the process to crash, resulting in denial of service (DoS). The vulnerability requires local access with low privileges (AV:L, PR:L) and does not require user interaction (UI:N). The scope is unchanged (S:U), and the impact is limited to availability (A:L) with no confidentiality or integrity loss. The CVSS 3.1 base score is 3.3, reflecting the low severity. No patches or known exploits are currently available, but the issue is publicly disclosed. ROS2 and Nav2 are widely used in robotics research, industrial automation, and autonomous systems, making this vulnerability relevant to organizations deploying these technologies. The vulnerability highlights the importance of secure parsing of configuration files and robust memory management in robotic software stacks.

Potential Impact

The primary impact of CVE-2024-25196 is a denial of service condition caused by crashing the nav2_controller process in ROS2/Nav2 environments. This can disrupt robotic navigation and control functions, potentially halting autonomous operations or industrial automation tasks. While the vulnerability does not compromise confidentiality or integrity, availability loss in robotic systems can lead to operational downtime, safety risks, and financial losses. Organizations relying on ROS2/Nav2 for critical robotics applications, such as manufacturing, logistics, or research, may experience interruptions. The requirement for local privileges limits remote exploitation, reducing the attack surface. However, insider threats or compromised local accounts could leverage this vulnerability to degrade system reliability. The absence of known exploits suggests limited active threat but does not preclude future exploitation attempts.

Mitigation Recommendations

To mitigate CVE-2024-25196, organizations should monitor Open Robotics and Nav2 project repositories for official patches and apply them promptly once released. Until patches are available, implement strict input validation and sanitization for all .yaml files processed by nav2_controller to prevent malformed inputs. Restrict local access to systems running ROS2/Nav2 to trusted users only, employing strong access controls and monitoring for suspicious activity. Employ runtime protections such as memory safety tools (e.g., AddressSanitizer) during development and testing to detect buffer overflows early. Consider containerization or sandboxing of nav2_controller processes to limit impact of crashes. Regularly audit and update robotic software dependencies to minimize exposure to known vulnerabilities. Finally, maintain incident response plans tailored to robotic system disruptions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d61b7ef31ef0b571acb

Added to database: 2/25/2026, 9:45:05 PM

Last enriched: 2/26/2026, 10:31:22 AM

Last updated: 4/12/2026, 7:06:12 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses