Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25198: n/a

0
Critical
VulnerabilityCVE-2024-25198cvecve-2024-25198
Published: Tue Feb 20 2024 (02/20/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Inappropriate pointer order of laser_scan_filter_.reset() and tf_listener_.reset() (amcl_node.cpp) in Open Robotics Robotic Operating Sytstem 2 (ROS2) and Nav2 humble versions leads to a use-after-free.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:31:50 UTC

Technical Analysis

CVE-2024-25198 is a use-after-free vulnerability identified in the amcl_node.cpp component of the Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions. The root cause is an incorrect order of pointer resets involving laser_scan_filter_.reset() and tf_listener_.reset(), which leads to a dangling pointer reference after one object is freed but still accessed by the other. This memory corruption flaw falls under CWE-416 (Use After Free). The vulnerability can be triggered remotely without requiring any authentication or user interaction, as it is exploitable over the network. Successful exploitation can result in denial of service by crashing the robotic system or potentially arbitrary code execution, compromising system integrity and availability. The CVSS v3.1 base score is 9.1 (critical), reflecting the ease of exploitation and severe impact. No patches or exploits are currently publicly available, but the vulnerability demands urgent attention due to its critical nature and the widespread use of ROS2 in robotics research, industrial automation, and autonomous systems.

Potential Impact

The impact of CVE-2024-25198 is significant for organizations relying on ROS2 and Nav2 for robotic applications. Exploitation can lead to denial of service, causing robotic systems to crash or become unresponsive, which in industrial or critical infrastructure contexts could halt operations and cause safety hazards. More severe exploitation might allow attackers to execute arbitrary code, potentially gaining control over robotic platforms, leading to manipulation of physical processes, data integrity breaches, or safety incidents. Given ROS2's adoption in autonomous vehicles, manufacturing robots, and research institutions, the vulnerability poses a risk to operational continuity, safety, and data integrity. The lack of required privileges or user interaction increases the attack surface, making widespread exploitation plausible if weaponized. Organizations globally that deploy ROS2-based systems in critical or commercial environments face potential operational and reputational damage.

Mitigation Recommendations

To mitigate CVE-2024-25198, organizations should first monitor for official patches or updates from the ROS2 and Nav2 maintainers and apply them promptly once available. In the interim, developers should review and correct the pointer reset order in amcl_node.cpp to prevent use-after-free conditions. Employing memory safety tools such as AddressSanitizer during development and testing can help detect similar issues early. Network-level protections should be enhanced to restrict access to ROS2 nodes, including firewall rules, VPNs, and network segmentation to limit exposure. Implement runtime monitoring and anomaly detection to identify unusual behavior indicative of exploitation attempts. Additionally, consider deploying robotic systems with least privilege principles and isolating critical components to reduce the blast radius of potential attacks. Regular code audits and static analysis focused on memory management are recommended to prevent recurrence of such vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d61b7ef31ef0b571ad7

Added to database: 2/25/2026, 9:45:05 PM

Last enriched: 2/26/2026, 10:31:50 AM

Last updated: 4/12/2026, 3:42:55 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses