CVE-2025-9020: Use After Free in PX4 PX4-Autopilot
A vulnerability was found in PX4 PX4-Autopilot up to 1.15.4. This issue affects the function MavlinkReceiver::handle_message_serial_control of the file src/modules/mavlink/mavlink_receiver.cpp of the component Mavlink Shell Closing Handler. The manipulation of the argument _mavlink_shell leads to use after free. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The identifier of the patch is 4395d4f00c49b888f030f5b43e2a779f1fa78708. It is recommended to apply a patch to fix this issue.
AI Analysis
Technical Summary
CVE-2025-9020 is a use-after-free vulnerability identified in the PX4-Autopilot software, specifically affecting versions up to 1.15.4. The flaw resides in the MavlinkReceiver::handle_message_serial_control function within the src/modules/mavlink/mavlink_receiver.cpp file, which is part of the Mavlink Shell Closing Handler component. The vulnerability occurs due to improper handling of the _mavlink_shell argument, leading to a use-after-free condition. This type of vulnerability can cause undefined behavior, including potential memory corruption, crashes, or arbitrary code execution if exploited. However, exploitation requires local access to the system, and the attack complexity is considered high, making successful exploitation difficult. No user interaction is needed, but the attacker must have at least low privileges on the device. The vulnerability impacts confidentiality, integrity, and availability to a limited extent due to the local and complex nature of the attack vector. The issue has been addressed in a patch identified by commit 4395d4f00c49b888f030f5b43e2a779f1fa78708, and applying this patch is recommended to remediate the vulnerability. The CVSS v4.0 score is 2.0, reflecting a low severity rating, primarily due to the high attack complexity, local attack vector, and limited scope of impact. No known exploits are currently reported in the wild.
Potential Impact
For European organizations utilizing PX4-Autopilot, particularly in sectors such as unmanned aerial vehicles (UAVs), drones, and robotics, this vulnerability poses a limited but tangible risk. Exploitation could lead to denial of service or potentially unauthorized code execution on the autopilot system, which may disrupt operations or compromise mission-critical functions. While the attack requires local access and is complex, insider threats or attackers gaining physical or network access to the device could leverage this flaw. The impact on confidentiality and integrity is low but non-negligible, especially for organizations relying on PX4 for sensitive or regulated operations such as infrastructure inspection, agriculture, or delivery services. Disruption or compromise of UAV control systems could have safety and operational consequences. Given the increasing adoption of PX4 in European drone applications, failure to patch this vulnerability could expose organizations to operational risks and regulatory scrutiny under frameworks like the EU Cybersecurity Act and NIS2 Directive.
Mitigation Recommendations
European organizations should prioritize applying the official patch identified by commit 4395d4f00c49b888f030f5b43e2a779f1fa78708 to all affected PX4-Autopilot deployments. Beyond patching, organizations should enforce strict access controls to limit local access to PX4 devices, including physical security measures and network segmentation to prevent unauthorized local connectivity. Implementing robust authentication and authorization mechanisms for device management interfaces can reduce the risk of local exploitation. Regularly auditing and monitoring PX4 systems for anomalous behavior or unauthorized access attempts is advisable. Additionally, organizations should maintain an inventory of PX4 versions in use and establish update policies to ensure timely application of security patches. For critical UAV operations, consider deploying runtime protections such as memory safety tools or sandboxing to mitigate potential exploitation impacts. Training personnel on secure handling and operation of PX4-based systems will further reduce risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-9020: Use After Free in PX4 PX4-Autopilot
Description
A vulnerability was found in PX4 PX4-Autopilot up to 1.15.4. This issue affects the function MavlinkReceiver::handle_message_serial_control of the file src/modules/mavlink/mavlink_receiver.cpp of the component Mavlink Shell Closing Handler. The manipulation of the argument _mavlink_shell leads to use after free. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The identifier of the patch is 4395d4f00c49b888f030f5b43e2a779f1fa78708. It is recommended to apply a patch to fix this issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-9020 is a use-after-free vulnerability identified in the PX4-Autopilot software, specifically affecting versions up to 1.15.4. The flaw resides in the MavlinkReceiver::handle_message_serial_control function within the src/modules/mavlink/mavlink_receiver.cpp file, which is part of the Mavlink Shell Closing Handler component. The vulnerability occurs due to improper handling of the _mavlink_shell argument, leading to a use-after-free condition. This type of vulnerability can cause undefined behavior, including potential memory corruption, crashes, or arbitrary code execution if exploited. However, exploitation requires local access to the system, and the attack complexity is considered high, making successful exploitation difficult. No user interaction is needed, but the attacker must have at least low privileges on the device. The vulnerability impacts confidentiality, integrity, and availability to a limited extent due to the local and complex nature of the attack vector. The issue has been addressed in a patch identified by commit 4395d4f00c49b888f030f5b43e2a779f1fa78708, and applying this patch is recommended to remediate the vulnerability. The CVSS v4.0 score is 2.0, reflecting a low severity rating, primarily due to the high attack complexity, local attack vector, and limited scope of impact. No known exploits are currently reported in the wild.
Potential Impact
For European organizations utilizing PX4-Autopilot, particularly in sectors such as unmanned aerial vehicles (UAVs), drones, and robotics, this vulnerability poses a limited but tangible risk. Exploitation could lead to denial of service or potentially unauthorized code execution on the autopilot system, which may disrupt operations or compromise mission-critical functions. While the attack requires local access and is complex, insider threats or attackers gaining physical or network access to the device could leverage this flaw. The impact on confidentiality and integrity is low but non-negligible, especially for organizations relying on PX4 for sensitive or regulated operations such as infrastructure inspection, agriculture, or delivery services. Disruption or compromise of UAV control systems could have safety and operational consequences. Given the increasing adoption of PX4 in European drone applications, failure to patch this vulnerability could expose organizations to operational risks and regulatory scrutiny under frameworks like the EU Cybersecurity Act and NIS2 Directive.
Mitigation Recommendations
European organizations should prioritize applying the official patch identified by commit 4395d4f00c49b888f030f5b43e2a779f1fa78708 to all affected PX4-Autopilot deployments. Beyond patching, organizations should enforce strict access controls to limit local access to PX4 devices, including physical security measures and network segmentation to prevent unauthorized local connectivity. Implementing robust authentication and authorization mechanisms for device management interfaces can reduce the risk of local exploitation. Regularly auditing and monitoring PX4 systems for anomalous behavior or unauthorized access attempts is advisable. Additionally, organizations should maintain an inventory of PX4 versions in use and establish update policies to ensure timely application of security patches. For critical UAV operations, consider deploying runtime protections such as memory safety tools or sandboxing to mitigate potential exploitation impacts. Training personnel on secure handling and operation of PX4-based systems will further reduce risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-14T06:00:30.227Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 689ee629ad5a09ad0063f0e4
Added to database: 8/15/2025, 7:47:53 AM
Last enriched: 8/15/2025, 8:02:48 AM
Last updated: 8/22/2025, 12:34:57 AM
Views: 17
Related Threats
CVE-2025-41452: CWE-15: External Control of System or Configuration Setting in Danfoss AK-SM8xxA Series
MediumCVE-2025-41451: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Danfoss AK-SM8xxA Series
HighCVE-2025-43752: CWE-770 Allocation of Resources Without Limits or Throttling in Liferay Portal
MediumCVE-2025-43753: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
LowCVE-2025-51606: n/a
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.