CVE-2026-1743: Authentication Bypass by Capture-replay in DJI Mavic Mini
A vulnerability has been found in DJI Mavic Mini, Air, Spark and Mini SE up to 01.00.0500. Affected by this vulnerability is an unknown functionality of the component Enhanced Wi-Fi Pairing. The manipulation leads to authentication bypass by capture-replay. The attack must be carried out from within the local network. A high degree of complexity is needed for the attack. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-1743 identifies a security vulnerability in DJI drones including the Mavic Mini, Air, Spark, and Mini SE models running firmware up to version 01.00.0500. The vulnerability resides in the Enhanced Wi-Fi Pairing feature, which is responsible for establishing secure connections between the drone and its controller or other devices. The flaw allows an attacker to perform an authentication bypass through a capture-replay attack, where previously captured authentication data packets are replayed to gain unauthorized access. This attack requires the adversary to be present on the same local network as the drone, such as a shared Wi-Fi environment. The complexity of the attack is high due to the need to capture and accurately replay packets without triggering security mechanisms, and no user interaction or privileges are necessary. The vendor DJI was notified early but has not issued any patches or official response. The vulnerability has been publicly disclosed, increasing the risk of potential exploitation despite the current lack of known active exploits. The CVSS 4.0 base score is 2.3, indicating low severity primarily due to the attack complexity, limited attack vector (local network only), and minimal impact on confidentiality, integrity, and availability. This vulnerability could allow unauthorized control or data access on affected drones if exploited, potentially compromising drone operations or sensitive data transmitted during pairing.
Potential Impact
The primary impact of this vulnerability is unauthorized access to the drone's pairing process, which could lead to control or data interception during the Wi-Fi pairing phase. For organizations relying on DJI drones for critical operations such as surveying, inspection, or security, this could result in operational disruption or leakage of sensitive information. However, the requirement for local network access and the high complexity of the attack significantly limit the scope and likelihood of exploitation. The absence of known exploits in the wild further reduces immediate risk. Nonetheless, in environments where adversaries can gain local network access—such as corporate campuses, event venues, or restricted areas—this vulnerability could be leveraged to bypass authentication controls. The lack of vendor response and patches means the risk remains unmitigated, potentially exposing users to future attacks as exploit techniques evolve. Overall, the impact is low but non-negligible for high-security contexts.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict network segmentation and access controls to prevent unauthorized devices from joining local networks where DJI drones operate. Use dedicated, isolated Wi-Fi networks for drone operations to minimize exposure. Monitor network traffic for unusual capture-replay patterns or repeated authentication attempts. Employ physical security measures to restrict proximity access to drones and their controllers. Until DJI releases a firmware update addressing this issue, avoid using affected firmware versions in sensitive environments. Consider disabling Enhanced Wi-Fi Pairing if possible or using alternative secure pairing methods. Regularly audit drone firmware versions and update promptly once patches become available. Additionally, educate drone operators about the risks of connecting to untrusted networks and the importance of operational security.
Affected Countries
United States, China, Germany, United Kingdom, France, Japan, South Korea, Australia, Canada, United Arab Emirates
CVE-2026-1743: Authentication Bypass by Capture-replay in DJI Mavic Mini
Description
A vulnerability has been found in DJI Mavic Mini, Air, Spark and Mini SE up to 01.00.0500. Affected by this vulnerability is an unknown functionality of the component Enhanced Wi-Fi Pairing. The manipulation leads to authentication bypass by capture-replay. The attack must be carried out from within the local network. A high degree of complexity is needed for the attack. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-1743 identifies a security vulnerability in DJI drones including the Mavic Mini, Air, Spark, and Mini SE models running firmware up to version 01.00.0500. The vulnerability resides in the Enhanced Wi-Fi Pairing feature, which is responsible for establishing secure connections between the drone and its controller or other devices. The flaw allows an attacker to perform an authentication bypass through a capture-replay attack, where previously captured authentication data packets are replayed to gain unauthorized access. This attack requires the adversary to be present on the same local network as the drone, such as a shared Wi-Fi environment. The complexity of the attack is high due to the need to capture and accurately replay packets without triggering security mechanisms, and no user interaction or privileges are necessary. The vendor DJI was notified early but has not issued any patches or official response. The vulnerability has been publicly disclosed, increasing the risk of potential exploitation despite the current lack of known active exploits. The CVSS 4.0 base score is 2.3, indicating low severity primarily due to the attack complexity, limited attack vector (local network only), and minimal impact on confidentiality, integrity, and availability. This vulnerability could allow unauthorized control or data access on affected drones if exploited, potentially compromising drone operations or sensitive data transmitted during pairing.
Potential Impact
The primary impact of this vulnerability is unauthorized access to the drone's pairing process, which could lead to control or data interception during the Wi-Fi pairing phase. For organizations relying on DJI drones for critical operations such as surveying, inspection, or security, this could result in operational disruption or leakage of sensitive information. However, the requirement for local network access and the high complexity of the attack significantly limit the scope and likelihood of exploitation. The absence of known exploits in the wild further reduces immediate risk. Nonetheless, in environments where adversaries can gain local network access—such as corporate campuses, event venues, or restricted areas—this vulnerability could be leveraged to bypass authentication controls. The lack of vendor response and patches means the risk remains unmitigated, potentially exposing users to future attacks as exploit techniques evolve. Overall, the impact is low but non-negligible for high-security contexts.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement strict network segmentation and access controls to prevent unauthorized devices from joining local networks where DJI drones operate. Use dedicated, isolated Wi-Fi networks for drone operations to minimize exposure. Monitor network traffic for unusual capture-replay patterns or repeated authentication attempts. Employ physical security measures to restrict proximity access to drones and their controllers. Until DJI releases a firmware update addressing this issue, avoid using affected firmware versions in sensitive environments. Consider disabling Enhanced Wi-Fi Pairing if possible or using alternative secure pairing methods. Regularly audit drone firmware versions and update promptly once patches become available. Additionally, educate drone operators about the risks of connecting to untrusted networks and the importance of operational security.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-01T16:35:47.330Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69802440ac06320222ae2d9d
Added to database: 2/2/2026, 4:12:48 AM
Last enriched: 2/23/2026, 9:56:24 PM
Last updated: 3/24/2026, 12:28:48 AM
Views: 50
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.