Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30961: n/a

0
High
VulnerabilityCVE-2024-30961cvecve-2024-30961
Published: Thu Dec 05 2024 (12/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble and navigation 2-humble allows a local attacker to execute arbitrary code via the error-thrown mechanism in nav2_bt_navigator.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 13:27:41 UTC

Technical Analysis

CVE-2024-30961 is a vulnerability identified in the Open Robotics Robotic Operating System 2 (ROS2), specifically within the navigation2 package's nav2_bt_navigator module in the Humble distribution. The root cause is insecure permissions that allow a local attacker with limited privileges (PR:L) to exploit the error-thrown mechanism to execute arbitrary code. This vulnerability is classified under CWE-94, which relates to improper control of code generation, indicating that the attacker can inject or execute malicious code due to insufficient validation or control over error handling routines. The CVSS v3.1 score of 7.8 reflects a high-severity issue with local attack vector, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability. The vulnerability allows an attacker to escalate their privileges or disrupt robotic navigation processes by executing arbitrary code, potentially leading to full system compromise or denial of service. Although no public exploits are currently known, the nature of the vulnerability makes it a significant risk for environments running ROS2 Humble and navigation2 Humble, especially in robotics systems where safety and reliability are critical. The lack of available patches at the time of publication necessitates immediate attention to access controls and monitoring.

Potential Impact

The impact of CVE-2024-30961 is substantial for organizations deploying ROS2-based robotic systems, particularly those using the Humble distribution and navigation2 stack. Successful exploitation can lead to arbitrary code execution with elevated privileges, compromising the confidentiality, integrity, and availability of robotic control systems. This could result in unauthorized control over robotic operations, manipulation of navigation data, disruption of automated processes, or even physical damage in industrial or service robots. The vulnerability could also be leveraged to pivot within internal networks, potentially exposing sensitive data or critical infrastructure. Given the increasing adoption of ROS2 in manufacturing, logistics, healthcare robotics, and autonomous vehicles, the threat extends to sectors where operational continuity and safety are paramount. The local attack vector limits remote exploitation but does not eliminate risk in environments where attackers can gain local access, such as through insider threats, compromised endpoints, or lateral movement after initial breach.

Mitigation Recommendations

To mitigate CVE-2024-30961, organizations should implement the following specific measures: 1) Restrict local access to ROS2 systems by enforcing strict user authentication and authorization policies, ensuring only trusted personnel have access. 2) Apply the principle of least privilege by limiting user and process permissions to the minimum necessary, preventing unauthorized code execution paths. 3) Monitor ROS2 navigation2 logs and error-handling events for unusual or suspicious activity that could indicate exploitation attempts. 4) Isolate ROS2 robotic systems within segmented network zones to reduce the risk of lateral movement if a local compromise occurs. 5) Stay informed about official patches or updates from the Open Robotics community and apply them promptly once available. 6) Conduct regular security audits and penetration testing focused on ROS2 environments to identify and remediate permission misconfigurations. 7) Consider implementing runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions tailored for robotic systems to detect anomalous behaviors in real time.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dcfb7ef31ef0b58eb7e

Added to database: 2/25/2026, 9:46:55 PM

Last enriched: 2/26/2026, 1:27:41 PM

Last updated: 4/12/2026, 3:44:19 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses