Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30964: n/a

0
High
VulnerabilityCVE-2024-30964cvecve-2024-30964
Published: Thu Dec 05 2024 (12/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble and navigation 2-humble allows a local attacker to execute arbitrary code via the initial_pose_sub thread created by nav2_bt_navigator

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 13:26:42 UTC

Technical Analysis

CVE-2024-30964 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code) found in the Open Robotics Robotic Operating System 2 (ROS2) navigation2 package, specifically in the navigation2-ROS2-humble and navigation2-humble distributions. The issue stems from insecure permissions associated with the initial_pose_sub thread created by the nav2_bt_navigator module. This thread improperly handles permissions, allowing a local attacker with limited privileges (PR:L) to execute arbitrary code within the context of the ROS2 navigation stack. The attack does not require user interaction (UI:N) and has a low attack complexity (AC:L), meaning it can be exploited relatively easily by someone with local access. The vulnerability affects the confidentiality, integrity, and availability of the system (C:H/I:H/A:H), potentially allowing attackers to take full control of robotic navigation processes. Although no public exploits have been reported yet, the nature of the vulnerability suggests that exploitation could lead to severe consequences, including manipulation or disruption of robotic operations. The vulnerability was reserved in March 2024 and published in December 2024, with no patches currently linked, indicating that mitigation may require manual configuration changes or awaiting official updates. This vulnerability is particularly critical for environments where ROS2 is deployed in safety-critical or industrial robotic systems.

Potential Impact

The impact of CVE-2024-30964 is significant for organizations relying on ROS2 for robotic navigation, including industrial automation, autonomous vehicles, research institutions, and defense applications. Successful exploitation allows local attackers to execute arbitrary code, potentially leading to full system compromise. This can result in unauthorized control over robotic movements, data theft, sabotage of robotic tasks, and disruption of critical operations. Given the high confidentiality, integrity, and availability impacts, organizations may face operational downtime, safety hazards, intellectual property loss, and reputational damage. The vulnerability's local attack vector means that insider threats or attackers who gain limited access to the system are primary risks. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for mitigation, especially as ROS2 adoption grows globally.

Mitigation Recommendations

To mitigate CVE-2024-30964, organizations should first implement strict access controls to limit local user privileges on systems running ROS2 navigation2 components. Employ mandatory access control (MAC) frameworks such as SELinux or AppArmor to restrict the permissions of the nav2_bt_navigator process and its threads. Monitor and audit local user activities to detect unauthorized attempts to interact with ROS2 processes. Until official patches are released, consider isolating ROS2 navigation systems within segmented networks to reduce exposure. Review and harden the configuration of ROS2 nodes, ensuring that only trusted users can interact with navigation2 modules. Engage with the ROS2 community and Open Robotics for updates and apply patches promptly once available. Additionally, conduct regular security assessments and penetration testing focused on local privilege escalation vectors within robotic systems.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-27T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dcfb7ef31ef0b58eb8c

Added to database: 2/25/2026, 9:46:55 PM

Last enriched: 2/26/2026, 1:26:42 PM

Last updated: 4/12/2026, 3:40:38 PM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses