Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30800: n/a

0
Medium
VulnerabilityCVE-2024-30800cvecve-2024-30800
Published: Tue Apr 23 2024 (04/23/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

PX4 Autopilot v.1.14 allows an attacker to fly the drone into no-fly zones by breaching the geofence using flaws in the function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:00:02 UTC

Technical Analysis

CVE-2024-30800 identifies a vulnerability in PX4 Autopilot version 1.14, a widely used open-source flight control software for drones. The flaw lies in the geofence enforcement function, which is designed to prevent drones from entering restricted or no-fly zones. Due to improper validation or logic errors (classified under CWE-229: Improper Restriction of Operations within the Bounds of a Memory Buffer), an attacker with local access and high privileges can manipulate the autopilot to bypass these geofence restrictions. This manipulation allows the drone to fly into areas that are otherwise prohibited, potentially violating airspace regulations and causing safety hazards. The CVSS v3.1 score of 5.6 reflects a medium severity, with the vector indicating that exploitation requires local access (AV:L), high attack complexity (AC:H), high privileges (PR:H), and user interaction (UI:R). The impact affects the integrity and availability of drone operations, as unauthorized flight paths can disrupt missions or cause physical damage. Confidentiality is not impacted. No patches or known exploits are currently available, but the vulnerability's presence in a critical control system for drones necessitates prompt attention from operators and developers.

Potential Impact

The primary impact of CVE-2024-30800 is on the integrity and availability of drone flight operations. By bypassing geofence restrictions, attackers can direct drones into restricted or sensitive areas such as airports, military zones, or critical infrastructure, potentially causing physical damage, regulatory violations, or safety incidents. This could lead to operational disruptions for commercial drone operators, emergency services, and defense applications. The requirement for high privileges and local access limits the scope of exploitation but does not eliminate the risk, especially in environments where insider threats or compromised systems exist. The inability to enforce no-fly zones undermines trust in drone autonomy and may result in legal and financial consequences for organizations. Additionally, unauthorized drone flights could be used for espionage or sabotage in geopolitically sensitive regions.

Mitigation Recommendations

To mitigate CVE-2024-30800, organizations should implement strict access controls to limit local and privileged access to PX4 Autopilot systems, ensuring only trusted personnel can interact with drone control software. Monitoring and logging of drone flight paths should be enhanced to detect deviations from authorized geofenced areas promptly. Operators should isolate drone control networks from general IT infrastructure to reduce the risk of privilege escalation. Until a patch is released, consider deploying additional external geofencing or GPS spoofing detection mechanisms to supplement the autopilot's native restrictions. Regularly update and audit drone software configurations and maintain awareness of vendor advisories for forthcoming patches. Training for operators on recognizing and responding to anomalous drone behavior is also recommended. Finally, coordinate with regulatory bodies to report incidents and comply with airspace regulations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dcab7ef31ef0b58e6be

Added to database: 2/25/2026, 9:46:50 PM

Last enriched: 2/26/2026, 5:00:02 PM

Last updated: 4/12/2026, 6:17:56 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses