Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38952: n/a

0
High
VulnerabilityCVE-2024-38952cvecve-2024-38952
Published: Tue Jun 25 2024 (06/25/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-38952 is a high-severity buffer overflow vulnerability found in PX4-Autopilot version 1. 14. 3, specifically in the topic_name parameter within the /logger/logged_topics. cpp file. This vulnerability allows remote attackers to cause a denial of service by crashing the autopilot system due to memory corruption. The flaw does not impact confidentiality or integrity but severely affects availability. Exploitation requires no privileges or user interaction and can be performed remotely over the network. No known exploits are currently reported in the wild. Organizations using PX4-Autopilot in drones or unmanned vehicles should prioritize patching once available and implement network-level protections to mitigate risk. Countries with significant drone usage and aerospace industries are most at risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:40:38 UTC

Technical Analysis

CVE-2024-38952 is a buffer overflow vulnerability identified in PX4-Autopilot version 1.14.3, an open-source flight control software widely used in drones and unmanned aerial vehicles (UAVs). The vulnerability exists in the handling of the topic_name parameter within the source file /logger/logged_topics.cpp. Specifically, improper bounds checking or validation of input data leads to a buffer overflow condition, which can corrupt memory and cause the autopilot software to crash or behave unpredictably. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects system availability (A:H) without impacting confidentiality or integrity. This means an unauthenticated remote attacker can trigger the overflow remotely, potentially causing a denial of service (DoS) by crashing the flight controller software, which could lead to loss of control of the UAV. The vulnerability is categorized under CWE-120, a classic buffer overflow issue, which is a common and well-understood software weakness. No patches or fixes are currently linked, and no exploits have been reported in the wild, but the risk remains significant due to the critical role of PX4 in UAV operations.

Potential Impact

The primary impact of CVE-2024-38952 is on the availability of UAV systems running PX4-Autopilot v1.14.3. Successful exploitation can cause the autopilot software to crash, leading to loss of control or forced landing of drones, which can result in operational disruptions, safety hazards, and potential physical damage or injury. For organizations relying on drones for critical infrastructure inspection, delivery, surveillance, or military applications, this vulnerability could cause mission failure or compromise operational continuity. Although confidentiality and integrity are not directly affected, the availability impact alone is severe given the safety-critical nature of UAV flight control. The ease of remote exploitation without authentication increases the threat level, especially in environments where UAVs communicate over unsecured or public networks. The lack of known exploits in the wild suggests limited current exploitation but also highlights the importance of proactive mitigation before attackers develop weaponized payloads.

Mitigation Recommendations

To mitigate CVE-2024-38952, organizations should: 1) Monitor PX4 project communications for official patches or updates addressing this buffer overflow and apply them promptly once available. 2) Implement network segmentation and firewall rules to restrict access to UAV control interfaces, limiting exposure to untrusted networks. 3) Employ intrusion detection systems (IDS) or anomaly detection to identify unusual traffic patterns targeting UAV communication channels. 4) Conduct thorough input validation and fuzz testing on custom integrations or extensions interacting with PX4 to identify similar vulnerabilities. 5) Develop contingency plans for UAV operation failures, including manual override capabilities and safe fail mechanisms. 6) If patching is delayed, consider disabling or restricting logging features related to the vulnerable topic_name parameter as a temporary workaround. 7) Engage with PX4 community and vendors to prioritize security audits and secure coding practices to prevent future buffer overflow issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c7eb7ef31ef0b56500f

Added to database: 2/25/2026, 9:41:18 PM

Last enriched: 2/26/2026, 5:40:38 AM

Last updated: 2/26/2026, 9:40:07 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats