Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38926: n/a

0
Critical
VulnerabilityCVE-2024-38926cvecve-2024-38926
Published: Fri Dec 06 2024 (12/06/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Open Robotics Robotic Operating System 2 (ROS2) and Nav2 humble versions were discovered to contain a use-after-free via the nav2_amcl process. This vulnerability is triggered via remotely sending a request for change the value of dynamic-parameter `/amcl z_short`.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 04:08:19 UTC

Technical Analysis

CVE-2024-38926 identifies a use-after-free vulnerability in the nav2_amcl process of Open Robotics' Robotic Operating System 2 (ROS2) and Nav2 humble versions. The vulnerability arises when a remote attacker sends a specially crafted request to change the dynamic parameter `/amcl z_short`. This triggers a use-after-free condition (CWE-416), a memory corruption flaw where the program continues to use memory after it has been freed, potentially leading to arbitrary code execution, process crashes, or other unpredictable behavior. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, making it highly accessible to attackers. The CVSS v3.1 base score is 9.1, reflecting the critical impact on integrity and availability, with no impact on confidentiality. The vulnerability affects robotic systems relying on ROS2 and Nav2 for navigation and localization, which are widely used in autonomous robots, industrial automation, and research platforms. No patches or known exploits are currently reported, but the severity and ease of exploitation necessitate urgent attention from users and maintainers of ROS2 environments.

Potential Impact

The impact of CVE-2024-38926 is significant for organizations deploying ROS2-based robotic systems. Successful exploitation can lead to integrity violations by allowing attackers to manipulate navigation parameters, potentially causing robots to behave unpredictably or dangerously. Availability can also be compromised through crashes or denial-of-service conditions triggered by the use-after-free. In safety-critical environments such as manufacturing, logistics, healthcare robotics, or autonomous vehicles, this could result in operational disruptions, physical damage, or safety hazards. The lack of authentication and user interaction requirements means attackers can exploit this vulnerability remotely, increasing the risk of widespread attacks. Organizations relying on ROS2 for automation or research must consider this vulnerability a critical threat to their operational continuity and safety.

Mitigation Recommendations

To mitigate CVE-2024-38926, organizations should implement the following specific measures: 1) Immediately restrict network access to the nav2_amcl service by using firewalls, network segmentation, or VPNs to limit exposure only to trusted entities. 2) Monitor and log all dynamic parameter change requests, especially those targeting `/amcl z_short`, to detect suspicious or unauthorized attempts. 3) Apply patches or updates from Open Robotics as soon as they become available; maintain close communication with ROS2 maintainers for timely security releases. 4) Employ runtime protections such as memory safety tools (e.g., AddressSanitizer) during development and testing to detect use-after-free conditions. 5) Conduct thorough code reviews and static analysis on custom ROS2 components that interact with dynamic parameters to identify similar vulnerabilities. 6) Develop incident response plans specific to robotic system compromises, including safe shutdown procedures to mitigate physical risks. These targeted actions go beyond generic advice by focusing on the unique aspects of ROS2 and robotic operational environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c7cb7ef31ef0b564f80

Added to database: 2/25/2026, 9:41:16 PM

Last enriched: 2/28/2026, 4:08:19 AM

Last updated: 4/12/2026, 1:58:20 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses