Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-26011: CWE-787: Out-of-bounds Write in ros-navigation navigation2

0
Critical
VulnerabilityCVE-2026-26011cvecve-2026-26011cwe-787cwe-122
Published: Thu Feb 12 2026 (02/12/2026, 20:42:50 UTC)
Source: CVE Database V5
Vendor/Project: ros-navigation
Product: navigation2

Description

CVE-2026-26011 is a critical heap out-of-bounds write vulnerability in the ROS 2 Navigation Framework (navigation2) version 1. 3. 11 and earlier. An unauthenticated attacker on the same ROS 2 DDS domain can exploit this by sending a specially crafted PoseWithCovarianceStamped message with extreme covariance values to the /initialpose topic. This triggers a negative index write into heap memory, corrupting heap metadata and enabling potential further exploitation or a reliable denial-of-service attack that halts robot localization and navigation. The vulnerability arises because a boundary check is compiled out in release builds, leaving no runtime protection. The CVSS 4. 0 score is 9. 3 (critical), reflecting the high impact and ease of exploitation without authentication or user interaction. No known exploits are currently in the wild.

AI-Powered Analysis

AILast updated: 02/12/2026, 21:18:53 UTC

Technical Analysis

CVE-2026-26011 is a critical vulnerability affecting the navigation2 package of the ROS 2 Navigation Framework, specifically versions 1.3.11 and earlier. The flaw exists in the Adaptive Monte Carlo Localization (AMCL) particle filter clustering logic, where a heap out-of-bounds write occurs due to improper handling of covariance values in geometry_msgs/PoseWithCovarianceStamped messages published to the /initialpose topic. An attacker on the same ROS 2 DDS domain can send a single crafted message with extreme covariance values that causes a negative index write (set->clusters[-1]) into heap memory preceding the allocated buffer. This corrupts heap chunk metadata, which can be manipulated to control the size of the heap chunk, potentially enabling further exploitation such as arbitrary code execution or system crashes. The vulnerability is exacerbated in release builds because the only boundary check is an assert statement that is compiled out, leaving no runtime protection. Exploitation requires no authentication or user interaction, and the attack surface is limited to the ROS 2 DDS domain network segment. The impact includes a reliable denial-of-service that disables localization and navigation functions critical to robotic operations. Although no known exploits have been reported in the wild, the high CVSS 4.0 score of 9.3 reflects the critical nature of this vulnerability. The flaw is categorized under CWE-787 (Out-of-bounds Write) and CWE-122 (Heap-based Buffer Overflow).

Potential Impact

For European organizations deploying ROS 2-based robotic systems, especially those relying on navigation2 for autonomous navigation and localization, this vulnerability poses a severe risk. Successful exploitation can lead to immediate denial-of-service, halting robotic navigation and potentially causing operational disruptions in manufacturing, logistics, healthcare, or research environments. The ability to corrupt heap metadata also raises the possibility of privilege escalation or arbitrary code execution, threatening system integrity and confidentiality. Given that ROS 2 is increasingly adopted in industrial automation and autonomous vehicle development across Europe, the impact extends to safety-critical applications. Disruptions could lead to financial losses, safety hazards, and damage to organizational reputation. The unauthenticated nature of the exploit means insider threats or compromised internal networks could be leveraged to attack. The lack of runtime boundary checks in release builds increases the likelihood of successful exploitation in production environments.

Mitigation Recommendations

1. Immediately isolate ROS 2 DDS domains from untrusted networks to restrict attacker access to the /initialpose topic. 2. Implement strict network segmentation and firewall rules to limit ROS 2 message traffic to trusted devices and users only. 3. Monitor ROS 2 topics, especially /initialpose, for anomalous or malformed PoseWithCovarianceStamped messages with extreme covariance values using custom detection scripts or ROS 2 middleware monitoring tools. 4. Apply patches or upgrade navigation2 to versions beyond 1.3.11 once they become available from the vendor or community. 5. Consider deploying runtime memory protection mechanisms such as heap canaries or address sanitizers during development and testing to detect exploitation attempts. 6. Conduct thorough code audits and fuzz testing on ROS 2 navigation components to identify and remediate similar memory safety issues. 7. Educate robotics engineers and operators about the risks of untrusted message injection within ROS 2 DDS domains and enforce strict access controls. 8. Use ROS 2 security features like SROS2 to enforce authentication and encryption on DDS communications, reducing the risk of unauthorized message injection.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-09T21:36:29.553Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698e404cc9e1ff5ad81500de

Added to database: 2/12/2026, 9:04:12 PM

Last enriched: 2/12/2026, 9:18:53 PM

Last updated: 2/12/2026, 11:17:04 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats