Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30799: n/a

0
Medium
VulnerabilityCVE-2024-30799cvecve-2024-30799
Published: Mon Apr 22 2024 (04/22/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in PX4 Autopilot v1.14 and before allows a remote attacker to execute arbitrary code and cause a denial of service via the Breach Return Point function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:00:13 UTC

Technical Analysis

CVE-2024-30799 is a vulnerability identified in PX4 Autopilot software version 1.14 and earlier, specifically within the Breach Return Point function. PX4 Autopilot is an open-source flight control software widely used in drones and unmanned aerial vehicles (UAVs). The vulnerability is classified under CWE-120, indicating a classic buffer overflow issue. This flaw allows a remote attacker with limited privileges (PR:L) and requiring user interaction (UI:R) to potentially execute arbitrary code or cause a denial of service (DoS). The attack vector is local (AV:L), meaning the attacker must have some form of local access, such as through a connected device or network segment. The attack complexity is high (AC:H), indicating that exploitation is not straightforward and requires specific conditions or knowledge. The vulnerability does not affect confidentiality or integrity but impacts availability by crashing or destabilizing the autopilot system. No patches or fixes have been published at the time of disclosure, and no known exploits are reported in the wild. This vulnerability poses a risk to the operational stability of drones relying on PX4, potentially leading to mission failure or loss of control.

Potential Impact

The primary impact of CVE-2024-30799 is on the availability of PX4 Autopilot systems, which could result in denial of service or unexpected behavior during drone operations. This can lead to mission failures, loss of control, or crashes, which may have safety implications especially in critical applications such as defense, emergency response, agriculture, and infrastructure inspection. Since the vulnerability allows arbitrary code execution, there is a theoretical risk of deeper system compromise if exploited successfully, although the high attack complexity and requirement for local access limit this risk. Organizations deploying PX4-based drones could face operational disruptions, financial losses, and reputational damage if the vulnerability is exploited. The lack of patches increases the window of exposure until mitigations or updates are applied.

Mitigation Recommendations

To mitigate CVE-2024-30799, organizations should first restrict local access to PX4 Autopilot systems by enforcing strict network segmentation and physical security controls to prevent unauthorized connections. Disable or limit the use of the Breach Return Point function if feasible until a patch is available. Monitor PX4 project repositories and security advisories closely for official patches or updates and apply them promptly once released. Implement runtime protections such as memory safety tools or sandboxing where possible to reduce the impact of buffer overflows. Conduct thorough testing of drone software updates in controlled environments before deployment. Additionally, educate operators about the risks of connecting untrusted devices or software to PX4 systems and enforce strict user interaction policies to minimize exploitation chances. Consider deploying intrusion detection systems that can identify anomalous behavior in drone control communications.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dcab7ef31ef0b58e6bb

Added to database: 2/25/2026, 9:46:50 PM

Last enriched: 2/26/2026, 5:00:13 PM

Last updated: 4/12/2026, 3:37:42 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses